Skip to content
                                                           Protecting
                                                          Trade Secrets

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 1 1/12/26 2:51 PM 6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 2 1/12/26 2:51 PM Protecting Trade Secrets First edition

                                                          Seth C. Oranburg
                                                     Pro --- essor O ---  Law
                                           University o ---  New Hampshire Franklin
                                                   Pierce School o ---  Law
                                            Director, Program on ­Organizations,
                                                   Business, and Markets
                                            NYU Law’s Classical Liberal Institute

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 3 1/12/26 2:51 PM Copyright © 2026 Seth C. Oranburg All Rights Reserved

                                                                 ISBN: 978-1-5310-3437-5
                                                                eISBN: 978-1-5310-3438-2
                                                                LCCN: 2025950107

                                                               Carolina Academic Press
                                                                   700 Kent Street
                                                             Durham, North Carolina 27701
                                                                   (919) 489-7486
                                                                 www.cap-press.com

                                                          Printed in the United States o ---  America

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 4 1/12/26 2:51 PM Contents

                Acknowledgments                                                            xi

                Chapter 1 | Understanding Trade Secret Law                                  3
                1.1. Introduction to Trade Secret Law                                       6
                1.2. Trade Secrets Within the Intellectual Property Framework              10
                     1.2.1. Trade Secret vs. Patent                                        10
                     1.2.2. Trade Secret vs. Copyright                                     11
                     1.2.3. Trade Secret vs. Trademark                                     11
                     1.2.4. Trade Secrets in the IP Landscape                              12
                1.3. De --- ining a Trade Secret: The Three Essential Ele­ments                13
                     1.3.1. In --- ormation                                                    13
                     1.3.2. Independent Economic Value  --- rom Not Being Generally
                            Known and Not Readily Ascertainable                            15
                            1.3.2.1. Independent Economic Value                            15
                            1.3.2.2. Not Generally Known                                   16
                            1.3.2.3. Not Readily Ascertainable                             17
                     1.3.3. Subject to Reasonable E ---

orts to Maintain Secrecy 19 1.3.4. Synthesizing the Three Ele­ments 20 1.4. Misappropriation o — Trade Secrets 21 1.4.1. Statutory Foundations and Wrong — ul Conduct 22 1.4.2. Improper Acquisition 22 1.4.3. Improper Use 23 1.4.4. Improper Disclosure 24 1.4.5. Proper Means: Reverse Engineering and ­Independent Discovery 26 1.4.5.1. Reverse Engineering 26 1.4.5.2. Independent Discovery 27 1.4.6. Balancing Ethics and Competition 28 1.5. Remedies — or Trade Secret Misappropriation 28 1.5.1. Remedial Goals 29 1.5.2. Injunctive Relie — 29

                                                          v

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 5 1/12/26 2:51 PM vi Contents

                                         1.5.2.1. Preliminary Injunctions                                  29
                                         1.5.2.2. Permanent and Tailored Injunctions                       30
                                  1.5.3. Damages: Lost Pro --- its, Unjust Enrichment, and Royalties           31
                                         1.5.3.1 Actual Loss                                               31
                                         1.5.3.2. Unjust Enrichment                                        32
                                         1.5.3.3. Reasonable Royalty                                       32
                                  1.5.4. Enhanced Damages and Attorneys’ Fees                              33
                                  1.5.5. Additional Equitable Remedies                                     34
                                  1.5.6. The Importance o ---  Prompt Action and Thorough Evidence             36
                                  1.5.7. Power­ --- ul and Nuanced Relie ---
                                  38
                             1.6. International Comparisons                                                38
                                  1.6.1. TRIPS: A Global Baseline  --- or Trade Secret Protections             40
                                  1.6.2. The ­EU Trade Secrets Directive                                   41
                                  1.6.3. China: Evolving En --- orcement ­Under Anti-­Un --- air Competition Law   41
                                  1.6.4. Canada: Blend o ---  Statutory and Common Law Princi­ples             42
                                  1.6.5. Mexico: Recent Re --- orms and Distinct Procedural Hurdles            43
                                  1.6.6. Israel: Balancing Innovation with Con --- identiality Obligations     43
                                  1.6.7. Convergence and Divergence in Global Trade Secret Regimes         44
                             1.7 Frictions and Trade-­O ---

s 45 1.7.1. Secrecy vs. Mobility 45 1.7.2. Con — identiality vs. Competition 45 1.7.3. Security vs. Transparency 46 1.7.4. Protection vs. Innovation 46 1.7.5. Trade Secret Protections in the Balance 46 1.8. From ­Legal De — initions to Practical Protection 46 Re — erences 47

                             Chapter 2 | Inventorying and Classi --- ying Trade Secrets                        49
                             2.1. Identi --- ication Is the Foundation  --- or Protection                          49
                             2.2. Identi --- ying Trade Secrets  --- or the Inventory                              50
                                  2.2.1. Technical Trade Secrets                                           50
                                  2.2.2. Business Trade Secrets                                            51
                                  2.2.3. Hybrid Trade Secrets                                              52
                             2.3. Applying the Three Essential Ele­ments                                   53
                                  2.3.1. In --- ormation                                                       54
                                  2.3.2. Independent Economic Value  --- rom Secrecy                           55
                                         2.3.2.1. Independent Economic Value                               56
                                         2.3.2.2. Not Generally Known                                      58
                                         2.3.2.3. Not Readily Ascertainable by Proper Means                59
                                  2.3.3. Subject to Reasonable E ---

orts to Maintain Secrecy 62

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 6 1/12/26 2:51 PM Contents vii

                2.4. Prioritizing Trade Secrets by Economic and Strategic Importance   63
                      2.4.1. High-­Priority Trade Secrets                              64
                      2.4.2. Medium-­Priority Trade Secrets                            65
                      2.4.3. Low-­Priority Trade Secrets                               67
                2.5. Creating the Trade Secret Inventory                               68
                2.6. Common Pit --- alls and Best Practices in Inventorying                70
                2.7. Integrating the Inventory Into Business Operations                72
                2.8. Maintaining and Updating the Inventory                            73
                2.9. Creating an ­Organizational Culture Around the Inventory          74
                2.10. From Classi --- ication to Action                                    76

                Chapter 3 | Assessing Risks and Mitigating Vulnerabilities             77
                3.1. The Centrality o ---  Risk Assessment                                 77
                3.2. Understanding Risk and Uncertainty                                78
                     3.2.1. De --- ining Risk                                              79
                     3.2.2. De --- ining Uncertainty                                       80
                     3.2.3. Domains o ---  Uncertainty in Trade Secret Strategy            81
                            3.2.3.1. Entrepreneurial Uncertainty                       82
                            3.2.3.2. Legal Uncertainty                                 82
                            3.2.3.3. Technological Uncertainty                         82
                            3.2.3.4 Human-­Behavioral Uncertainty                      83
                3.3. Vectors o ---  Loss o ---  Secrecy                                        83
                     3.3.1. Insider Threats and Employee Mobility                      84
                     3.3.2. Vendor and Partner Exposure                                86
                     3.3.3. Cybersecurity and Technical Weak Points                    88
                     3.3.4. Reverse Engineering and Law --- ul Discovery                   89
                     3.3.5. Necessary Disclosure and Operational Sharing               90
                3.4. Strategic Decision-­Making ­Under Conditions o ---  Uncertainty       92
                     3.4.1. Regret Minimization                                        92
                     3.4.2. Option Value and Flexibility                               93
                     3.4.3. Scenario Thinking and Adaptive Planning                    93
                     3.4.4. Legal Uncertainty and Judicial Risk                        94
                     3.4.5. Organizational Be­hav­ior and Bias                         94
                3.5. Mapping and Pro --- iling the Threat Environment                      96
                     3.5.1. Adversary Pro --- iling                                        96
                     3.5.2. Attack Sur --- ace Analy­sis                                   97
                3.6. Methods  --- or Assessing Risks                                       97
                     3.6.1. Vulnerability Audits                                       98
                     3.6.2. Risk Matrices                                              98
                     3.6.3. Framework Integration                                      99

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 7 1/12/26 2:51 PM viii Contents

                             3.7. The Trade Secret Paradox                                      100
                             3.8. Resolving the Circularity Paradox                             101
                             3.9. From Awareness to Action                                      102
                                  Re --- erences                                                    103

                             Chapter 4 | Mitigating Internal Vulnerabilities                    105
                             4.1. Internal Risk as the Primary Threat                           106
                             4.2. Con --- identiality Agreements and Contractual Sa --- eguards         107
                                  4.2.1. Core Doctrines in Trade Secret Contracts               108
                                  4.2.2. Nondisclosure Agreements                               110
                                  4.2.3. Non-­Solicitation and Noncompetition Agreements        113
                                  4.2.4. Assignment o ---  Inventions and IP Rights                 115
                             4.3. Judicial En --- orcement o ---  Restrictive Covenants                 118
                                  4.3.1. En --- orcement o ---  Nondisclosure Agreements                118
                                  4.3.2. En --- orcement o ---  Non-­Solicitation Clauses               120
                                  4.3.3. En --- orcement o ---  Noncompetition Clauses                  122
                                  4.3.4. En --- orcement o ---  Invention Assignment and IP Clauses     125
                                  4.3.5. Public Policy Limits on Restrictive Covenants          126
                             4.4. Access Controls and Operational Sa --- eguards                    128
                                  4.4.1. Role-­Based Access Limitation                          129
                                  4.4.2. Document Control, Labeling, and Classi --- ication         130
                                  4.4.3. Monitoring, Auditing, and Insider Activity Detection   132
                             4.5. Onboarding and Training                                       134
                             4.6. Exit Protocols and Post-­Employment Risk                      136
                             4.7. When Internal Sa --- eguards Fail                                 138
                             4.8. Turning Policy Into Practice                                  139

                             Chapter 5 | Mitigating External Vulnerabilities                    141
                             5.1. External Vulnerability as a Structural Prob­lem               142
                             5.2. Vendor Relationships                                          143
                                  5.2.1. Limiting Vendor Rights                                 144
                                  5.2.2. Audit Rights and Oversight Clauses                     145
                                  5.2.3. Indemnity and Liquidated Damages Clauses               146
                             5.3. Collaborative Development: Blurred Bound­aries and
                                  Owner­ship Con --- usion                                          149
                                  5.3.1. Use Restrictions in Joint Development                  151
                                  5.3.2. Return and Destruction Obligations at Termination      152
                             5.4. Customer Disclosures: Evaluation, Exposure, and
                                  Reverse Engineering                                           154
                             5.5. Distribution Relationships and Downstream Risk                156
                                  5.5.1. In --- ormal Channels and the Absence o ---  Control           156

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 8 1/12/26 2:51 PM Contents ix

                     5.5.2. Downstream Propagation and Sub-­Agent Risk                157
                     5.5.3. Termination and Retained Access                           158
                5.6. Architectural Sa --- eguards and System-­Level En --- orcement           159
                5.7. Cybersecurity and Trade Secret Exposure                          161
                     5.7.1. Per­sis­tent Access and Credential Mismanagement          162
                     5.7.2. API Access and Embedded Data Flows                        163
                     5.7.3. Cloud Storage and Multi-­Tenant In --- rastructure            165
                     5.7.4. Security Standards and Contractual Promises               166
                     5.7.5. Incident Response and Noti --- ication Obligations            168
                     5.7.6. Designing Digital Containment Systems                     169
                5.8. Conclusion                                                       170

                Chapter 6 | En --- orcing Trade Secret Rights                             173
                6.1. The Statutory De --- inition o ---  Misappropriation                     174
                      6.1.1. Acquisition by Improper Means                            174
                      6.1.2. Improper Use                                             176
                      6.1.3. Improper Disclosure                                      178
                      6.1.4. Liability  --- or Knowing Receipt                            179
                      6.1.5. Limits o ---  the Statutory Scope                            182
                6.2. Limits o ---  Liability and Early Dismissal                          184
                      6.2.1. Failure to Allege a Cognizable Trade Secret              184
                      6.2.2. Failure to Show Reasonable E ---

orts to Maintain Secrecy 185 6.2.3. Failure to Allege Improper Conduct 187 6.3. Proving the Trade Secret at the Time o — Suit 188 6.3.1. Secrecy, Value, and Control 190 6.3.2. Evidentiary Burdens and Typical De — enses 190 6.3.3. Litigation-­Stage Reasonableness Analy­sis 191 6.4. Injunctive Relie — 192 6.4.1. Temporary Restraining ­Orders 193 6.4.2. Preliminary Injunctions 193 6.4.3. Permanent Injunctions and Post-­Trial Remedies 194 6.5. Monetary Remedies 195 6.5.1. Actual Loss 196 6.5.2. Unjust Enrichment 196 6.5.3. Reasonable Royalty 197 6.6. Ex Parte Seizure 198 6.7. Attorneys’ Fees and Enhanced Damages 200 6.8. Criminal En — orcement 201 6.9. Strategic and Procedural Dynamics 203 6.9.1. Venue and Jurisdiction 203 6.9.2. Discovery, Protective ­Orders, and Evidence Management 204

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 9 1/12/26 2:51 PM x Contents

                                  6.9.3. Summary Judgment and Early Disposition              206
                                  6.9.4. Litigation Timing and Investigative Coordination    206
                            6.10. En --- orcement Plans as Reasonable Steps                      207

                            Chapter 7 | The Living TSPP: Sustaining and Adapting
                                         Trade Secret Protection                             209
                            7.1. The Li --- ecycle o ---  a TSPP: Why Static Plans Fail              210
                            7.2. Property Rules, Liability Rules, and En --- orcement Strategy   212
                            7.3. The Contract–­Trade Secret Inter --- ace                        213
                            7.4. Organizational Culture and Continuous Improvement           216
                            7.5. Technology, Globalization, and Emerging Challenges          218
                            7.6. Synthesis: The Living TSPP                                  221
                                 Conclusion: The Partner-­Level Mindset                      223
                                 Re --- erences                                                  224

                            Epilogue                                                         227

                            Appendix A | [New Hampshire] Uni --- orm Trade Secrets Act           229
                            Appendix B | De --- end Trade Secrets Act
                                         (DTSA, 18 USC § 1836 et seq.)                       233
                            Appendix C | Economic Espionage Act
                                         (EEA, including § 1831 and § 1832)                  239
                            Appendix D | Glossary                                            245

                            Table o ---  Cases                                                   267
                            Index                                                            271

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 10 1/12/26 2:51 PM Acknowledgments

                    Thanks to Ryan Vacca. Ryan is now the John D. Lawson Pro --- essor o ---  Law and
                Associate Dean  --- or Academic A ---

airs at the University o — Missouri School o — Law. More importantly (to me), he was my cherished colleague at the University o — New Hampshire Franklin Pierce School o — Law. When a curricular need — or me to teach Trade Secrets thrust me into the intellectual property world, Ryan generously shared his materials and coached me on teaching e —


ectively. Ryan’s con — idence in my abilities and his passion — or the subject sparked my love — or the trade secret-­contract con- nection. Over time, I reshaped the course to re — lect my transactional — ocus, distinct


rom Ryan’s litigation-­centered approach, as you ­will see in this book. And while our teaching styles diverged, Ryan still provided a thorough review o — this book on its own terms, o —


ering invaluable comments that greatly improved this work while preserving my vision. A ­great mentor and true leader helps ­others shine in their unique way. Ryan, through his kindness and humility, inspires countless students and colleagues. I’m grate — ul to be numbered among them. And thank you, Ryan, — or the salsa —­ perhaps ­we’ll keep that our own trade secret. Thanks also to my UNH FP Hybrid JD students who reviewed this manuscript. I — eel deeply honored by the opportunity not only to teach but also to learn — rom this diverse and talented “non-traditional” cohort. In particular I thank Vinh Nguyen and Eric Lee — or thought — ul and constructive comments.

                                                           Why This Book
                    This book o ---

ers a practice-­ — orward complement to the traditional casebook. It is built around a single, ­organizing insight: the best way to understand trade secret law is to design a plan that applies it. Rather than starting with abstract theory and hoping students can extrapolate practice, this book begins with a practical challenge —­ how to protect a com­pany’s trade secrets —­ and develops deeper understanding along the way. The result is a clear, concrete, and rigorous guide to one o — the most complex and consequential areas o — modern intellectual property law. Each chapter sca —


olds learning around a speci — ic output: identi — ying secrets, devel- oping policies, allocating responsibilities, and responding to l­egal and ethical chal- lenges. This approach helps students grasp not only what the law says but also what

                                                                 xi

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 11 1/12/26 2:51 PM xii Acknowledgments

                            it demands in real-­world settings. The book draws on leading scholarship, doctrinal
                            sources, and business strategy lit­er­a­ture to integrate theory with application.
                               It is especially well-­suited  --- or experiential courses, where students learn by ­doing,
                            but its modular structure and doctrinal  --- oundations also make it adaptable  --- or semi-
                            nars or advanced classes in intellectual property or business law. It supports a range
                            o ---  assessment methods,  --- rom traditional exams to simulation-­based deliverables, and
                            culminates in a comprehensive capstone: a polished, port --- olio-­ready Trade Secret
                            Protection Plan  --- or a simulated client.



                                                           How This Book Works
                               This book is structured to support  --- lexible, experiential, and simulation-­ --- riendly
                            instruction while remaining grounded in core l­egal doctrine. It prepares students
                            to practice trade secret law by building a trade secret protection plan, step-­by-­step,
                            applying ­legal princi­ples in context, and producing pro --- essional-­grade work product
                            by course’s end.
                               The company-­side transactional planning lens o ---

ers students a coherent intro- duction to trade secret law through the perspective o — sa — eguarding a business’s pro- prietary knowledge. Although it acknowledges that prac­ti­tion­ers may also represent employees, license trade secrets, or litigate disputes, the book deliberately — ocuses on one core aspect o — IP practice to support a learn-­by-­doing method and build con — i- dence be — ore branching into adjacent domains. Each chapter integrates concise doctrinal explanations, real-­world examples, and application-­oriented prompts. Key terms and l­egal tests are introduced clearly, with re — erences to — oundational cases, statutes, and scholarly debates. Case excerpts pro- vide optional depth — or students who want to explore pre­ce­dent without interrupting the — low o — applied learning. Assignments, re — lection prompts, and workshop exercises are interwoven through- out, enabling instructors to use the book in — lipped, hybrid, or traditional classroom


ormats. Chapters are both modular and cumulative, allowing instructors to — ollow the — ull sequence or select only ­those that align with speci — ic course objectives. By preparing students not just to understand trade secret law but also to implement it with clarity, creativity, and strategic judgment, the book serves as a bridge between classroom and practice. Trade secret law is one o — the most vital pillars o — modern intellectual property law. By anchoring doctrine in concrete outputs, this book invites students to treat trade secret protection not as a compliance task but rather as a deliberate strategy — or long-­ term value creation.

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 12 1/12/26 2:51 PM Protecting Trade Secrets

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 1 1/12/26 2:51 PM 6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 2 1/12/26 2:51 PM Chapter 1 Understanding Trade Secret Law

                    Trade secrets are perhaps the most power­ --- ul —­ and the most precarious —­  --- orm o ---

                intellectual property. They o ---

er protection without registration, without — ormal proce- dures, and without expiration. A trade secret can remain exclusive — or ­decades, but only i — its ­owner keeps it that way. The law does not create trade secrets; it recognizes and en — orces them ­a — ter the — act. This makes trade secret law both deceptively ­simple and intensely practical. It is a body o — law that rewards vigilance, structure, and — oresight. The modern de — inition o — “trade secret” is — ound in the Uni — orm Trade Secrets Act (UTSA), which has been ­adopted by 48 states.

                                             De --- inition o ---  “Trade Secret”

                                                          UTSA § 1(4)
                     “Trade secret” means in --- ormation, including a  --- ormula, pattern, compilation,
                     program, device, method, technique, or ­process, that:
                           (a) Derives i­ndependent economic value, ­actual or potential,  --- rom not
                               being generally known to, and not being readily ascertainable by
                               proper means by, other persons who can obtain economic value  --- rom
                               its disclosure or use; and
                           (b) Is the subject o ---  e ---

orts that are reasonable ­under the circumstances to maintain its secrecy.

                   New York relies on common law princi­ples, as re --- lected in the Restatement (First)
                o ---  Torts § 757, which similarly de --- ines a trade secret as any  --- ormula, pattern, device, or
                compilation o ---  in --- ormation used in one’s business that provides a competitive advan-
                tage and requires reasonable e ---

orts to maintain its secrecy. North Carolina has not


ormally adopted the UTSA, but many practitioners believe its state laws are e —


ec- tively similar to the UTSA is most respects. A core concept in how law de — ines trade secrets is “reasonable” e —


orts. Trade secret law does not demand absolute secrecy or per — ect protection. Rather, it requires sa — e- guards that are appropriate and proportionate to the context. But how much e —


ort

                                                               3

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 3 1/12/26 2:51 PM 4 1 • Understanding Trade Secret Law

                             is enough to earn l­egal protection? As with many l­egal standards, the answer is: it
                             depends. Depends on what? That is the question this book aims to answer by showing
                             what businesses must do to build, maintain, and de --- end their trade secrets in practice.
                                Unlike patents or trademarks, trade secrets do not depend on public notice or
                             overt use. Their value comes  --- rom being kept quiet. A ­process  --- or manu --- acturing
                             composite materials, a pricing algorithm, a customer list, or a proprietary training
                             manual can quali --- y as a trade secret so long as it meets the l­egal de --- inition and is
                             subject to reasonable e ---

orts to maintain its secrecy. That is where the real challenge lies: protecting that which is unseen, o — ten across departments, locations, vendors, and even borders. While patent law gives patent holders broad rights to exclude ­others — rom ­independent development or reverse engineering on patented inventions, trade secret law gives trade secret holders the narrow right to sue — or “misappropriation,” which is also de — ined in the UTSA.

                                                    De --- inition o ---  “Misappropriation”

                                                                      UTSA § 1(2)
                                 “Misappropriation” means:
                                       (a) Acquisition o ---  a trade secret o ---  another by a person who knows or has
                                           reason to know that the trade secret was acquired by improper means;
                                           or
                                       (b) Disclosure or use o ---  a trade secret o ---  another without express or
                                           implied consent by a person who:
                                             (1) Used improper means to acquire knowledge o ---  the trade secret; or
                                             (2) At the time o ---  disclosure or use, knew or had reason to know that
                                                 his knowledge o ---  the trade secret was derived  --- rom or through a
                                                 person who had utilized improper means to acquire it; or acquired
                                                 ­under circumstances giving rise to a duty to maintain its secrecy
                                                  or limit its use; or derived  --- rom or through a person who owed a
                                                  duty to the person seeking relie ---  to maintain its secrecy or limit its
                                                  use; or
                                             (3) Be --- ore a material change o ---  his position, knew or had reason to
                                                  know that it was a trade secret and that knowledge o ---  it had been
                                                  acquired by accident or ­mistake.



                                The key word in the misappropriation de --- inition is “improper.” ­There are proper
                             means o ---  acquiring, using, and disclosing ­others’ trade secrets, which are not pro-
                             hibited by trade secret law. However, upon a showing that some in --- ormation is a

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 4 1/12/26 2:51 PM 1 • Understanding Trade Secret Law 5

                trade secret that has been misappropriated by improper acquisition, improper use, or
                improper disclosure, the court ­will award remedies. A common remedy  --- or misap-
                propriation is an injunction that stops or prevents misappropriation.


                                                          INJUNCTIVE RELIEF

                                                               UTSA § 2
                     ­Actual or threatened misappropriation may be enjoined.



                  Alternatively, or additionally, courts can order a misappropriator to pay money
                damages  --- or the harm.


                                                              Damages

                                                              UTSA § 3(1)
                     . . . Damages can include both the ­actual loss caused by misappropriation and
                     the unjust enrichment caused by misappropriation . . . ​[or] a reasonable royalty

or a misappropriator’s unauthorized disclosure or use o — a trade secret.

                   In cases o ---  “will --- ul and malicious” misappropriation, courts may award “exem-
                plary” damages o ---  up to twice the amount o ---  ­actual damages in addition to the com-
                pensatory award, e ---

ectively allowing treble damages in total. Courts may also award attorneys’ — ees to the prevailing party where a misappropriation claim or de — ense was brought in bad — aith. The De — end Trade Secrets Act (DTSA) creates a — ederal civil cause o — action — or trade secret misappropriation and largely mirrors the substantive provisions o — the UTSA as ­adopted by most states. The DTSA also includes two notable — eatures absent


rom most state laws. First, it authorizes “ex parte civil seizure,” an extraordinary remedy that allows a court to order the seizure o — property without advance notice to the accused party, but only in exceptional circumstances where standard injunctions would be inadequate to prevent the immediate and irreparable dissemination o — a trade secret. Second, the DTSA expressly provides — or extraterritorial application, permitting claims against acts o — misappropriation occurring outside the United States so long as the o —


ender is a US person (which has a broad meaning, including any natural per- son, corporation, business trust, estate, trust, partnership, association, joint venture, government, governmental subdivision or agency, or any other legal or commercial entity) or the misappropriation has a su —


icient nexus to US commerce.

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 5 1/12/26 2:51 PM 6 1 • Understanding Trade Secret Law

                                                               Extraterritoriality

                                                                     18 USC § 1837
                                 This chapter [18 USCS §§ 1831 et seq.] also applies to conduct occurring out-
                                 side the United States i ---  —­ 
                                       (1) the o ---

ender is a natu­ral person who is a citizen or permanent resident alien o — the United States, or an ­organization ­organized ­under the laws o — the United States or a State or ­political subdivision thereo — ; or (2) an act in — urtherance o — the o —


ense was committed in the United States.

                                Two deceptively complex and essential questions lie within this relatively straight-

orward statutory — ramework. First, what counts as improper means o — acquiring, using, or disclosing a trade secret? This ex post inquiry (litigated ­a — ter the — act) o — ten turns on business norms, industry expectations, and case-­speci — ic judgments about


airness and intent. Second, what quali — ies as reasonable e —


orts to protect a secret in the — irst place? This ex ante question (regarding steps taken be — ore any misappro- priation occurs) demands proactive sa — eguards: l­egal, operational, and cultural. The chapters that — ollow ­will equip you to navigate both dimensions with practical insight and strategic clarity. This opening chapter lays the — oundation — or understanding trade secrets as both a ­legal and business concept. It begins with the historical origins o — trade secret doctrine and then de — ines what quali — ies — or protection. From ­there, it examines the meaning o —

                              misappropriation and surveys the remedies available when secrecy is lost. Along the
                              way, it introduces key cases and l­egal standards that  --- orm the backbone o ---  modern
                              trade secret practice.
                                 Above all, this chapter establishes the central premise o ---  the book: trade secret
                             protection is not a passive entitlement. It is an active ­process. Every­thing that  --- ollows
                             ­will build on this insight.



                                       1.1. Introduction to Trade Secret Law
                                Trade secrets are perhaps the least known o ---  the major intellectual property  --- orms.
                             They depend entirely on secrecy. ­Owners must protect their con --- idential business
                             in --- ormation  --- rom public view rather than relying on government registration. I ---  the
                             secret leaks out, the law usually cannot restore its exclusivity. Yet, when properly
                             guarded, trade secrets can preserve a signi --- icant competitive edge  --- or as long as the
                             in --- ormation remains hidden. Examples include manu --- acturing methods, specialized

ormulas, customer lists, or other commercially valuable data that is not generally known in the industry.

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 6 1/12/26 2:51 PM 1 • Understanding Trade Secret Law 7

                   Historically, socie­ties recognized that exclusive knowledge  --- osters innovation.
                Medieval guilds protected ­recipes,  --- ormulas, and skills to secure their economic posi-
                tions. Early American courts likewise en --- orced agreements and duties not to mis-
                use con --- idential in --- ormation, well be --- ore modern statutes described “trade secrets”
                by name. Two 19th-­century Mas­sa­chu­setts cases —­  Peabody v. Nor --- olk and Vickery
                v. Welch —­ are among the most in --- luential o ---  ­these early decisions. They show how
                courts began treating secret commercial knowledge as an asset worthy o ---  ­legal protec-
                tion, even without a patent.



                                   ­L egal Protection o ---  Secret Pro­c esses

                                                                Peabody v. Nor --- olk
                                                               98 Mass. 452 (1868)
                     Peabody in­ven­ted a proprietary jute-­manu --- acturing ­process and disclosed it
                     to Nor --- olk ­under an agreement  --- orbidding  --- urther disclosure or use. Nor --- olk
                     ­later attempted to exploit that ­process himsel --- . The court granted Peabody an
                      injunction, ruling that keeping a ­process hidden (rather than patenting it) did
                      not  --- or --- eit its protection. The court called such hidden know-­how “property”
                      that equity would protect, and it highlighted that employees or associates who
                      gain knowledge ­under a duty o ---  con --- idence cannot law --- ully disclose it or pro --- it

rom it in breach o — trust.

                   By the time Peabody was de­cided, courts had already grappled with business trans-
                actions that hinged on secret knowledge. Sometimes, parties tried to buy or sell exclu-
                sive pro­cesses or ­recipes. I ---  a seller re --- used to share the  --- ull details, the buyer might
                sue, claiming they paid  --- or something they never received. In ­these disputes, judges
                had to decide ­whether a secret method could be treated like any other piece o ---  prop-
                erty. They generally concluded that it could be, as long as both parties recognized its
                con --- idential nature.



                                      ­L egal Trans --- er o ---  a Secret Method

                                                                Vickery v. Welch
                                                          36 Mass. (19 Pick.) 523 (1837)
                     Welch agreed to sell a chocolate-­making ­process —­ plus his mills —­ to Vickery,
                     who believed he was purchasing the exclusive right to Welch’s secret. ­A --- ter the
                     sale, Welch withheld part o ---  the ­process and argued that the contract should
                     not bar him  --- rom reusing or reselling it. The court sided with Vickery. It held
                     that a secret business method can be sold as a valuable asset, and once sold, the

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 7 1/12/26 2:51 PM 8 1 • Understanding Trade Secret Law


ormer ­owner cannot continue exercising the same secret in a way that nulli-


ies the buyer’s exclusive rights. The decision — oreshadowed modern contract-­ based trade secret cases by con — irming that an ­owner may convey a hidden method as i — it ­were property, subject to conditions preserving con — identiality.

                                ­These 19th-­century cases o ---

ered a ­legal — oundation: a person who develops secret knowledge can share it selectively and expect ­others to keep it concealed. I — a recipient violates that trust, courts may en — orce the original agreement or implied duty. In the early 20th ­century, judges extended ­these princi­ples. They recognized that ­limited dis- closure, ­under appropriate sa — eguards, o — ten helps a business grow without destroying secrecy. For example, a — amous Supreme Court ruling in 1905 upheld the Board o —

                             Trade’s practice o ---  restricting its grain price quotations to paying subscribers who
                             promised not to circulate them  --- urther.



                                                   Controlled Distribution Protects
                                                         Secret In --- ormation

                                             Board o ---  Trade o ---  City o ---  Chicago v. Christie Grain & Stock Co.
                                                                  198 U.S. 236 (1905)
                                 The Chicago Board o ---  Trade compiled real-­time grain price data. It provided
                                 that data to speci --- ic subscribers ­under con --- identiality conditions. A competitor
                                 obtained the in --- ormation indirectly and published it. The Supreme Court held
                                 that the Board had not lost its property rights by sharing its data ­under strict
                                 limitations. This early decision showed how a secret could remain protected
                                 i ---  the ­owner maintained  --- irm rules on who gets access and ­under what terms.



                                Over time, courts clari --- ied that is the manner o ---  acquisition —­ rather than the mere

act o — possession —­ o — ten determines liability. ­People who in­de­pen­dently discover or reverse engineer an unpatented — ormula are ­ — ree to use it, no ­matter how much the original inventor wants to keep it hidden. But employees, partners, or outsiders who obtain the same in — ormation through breach o — con — idence — ace potential liability. In 1917, the Supreme Court — amously underscored that “the breach o — trust” lay at the heart o — trade secret law.

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 8 1/12/26 2:51 PM 1 • Understanding Trade Secret Law 9

                                      Trade Secret Law Focuses on Trust

                                           E. I. du Pont de Nemours Powder Co. v. Masland
                                                          244 U.S. 100 (1917)
                     Justice Holmes declined to label the misappropriated manu --- acturing in --- orma-
                     tion as “property” in a strict sense. Instead, he stressed that disclosing or using
                     data given in con --- idence is a wrong in itsel --- . Once a business shares valuable
                     secrets ­under conditions o ---  trust, the recipient must not exploit them to the
                     ­owner’s detriment. This emphasis on a breach o ---  con --- idence rather than on
                      technical de --- initions o ---  property still guides trade secret disputes ­today.



                   In the mid-1900s, the UTSA codi --- ied many o ---  t­hese common law rules. Most
                states have ­adopted some version o ---  the UTSA, ensuring that secrecy, competitive
                value, and reasonable e ---

orts at concealment remain the threshold ele­ments. Then in 2016, Congress enacted the DTSA, establishing a — ederal civil cause o — action. A key Supreme Court case addressed ­whether opting — or secrecy con — licts with patent law.

                                   Patent Law and Trade Secrecy Coexist

                                                      Kewanee Oil Co. v. Bicron Corp.
                                                          416 U.S. 470 (1974)
                     Kewanee Oil maintained industrial pro­cesses as secrets rather than seeking
                     patents. When ex-­employees took that know-­how to a competitor, the com-
                     petitor argued that state trade secret law was incompatible with  --- ederal patent
                     policy. The Supreme Court disagreed. It ruled that trade secret protection does
                     not undermine the patent system’s goals ­because patents demand disclosure,
                     whereas trade secrets do not. Both routes can advance innovation, and each
                     developer decides which path to  --- ollow.



                   Hence, the modern body o ---  trade secret law began taking shape well be --- ore the
                20th ­century, propelled by cases like Peabody, Vickery, Board o ---  Trade, and Masland,
                and ­later re --- ined by Kewanee and statutory re --- orms. Together, ­these authorities con-

irm that secret in — ormation can be protected i —

                       (1) it is kept con --- idential with reasonable diligence,
                       (2) it has value precisely ­because it is not generally known, and
                       (3) others acquire it improperly or in breach o ---  a duty o ---  trust when
                           disputes arise.

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 9 1/12/26 2:51 PM 10 1 • Understanding Trade Secret Law

                                Modern technology and remote collaboration make secrecy both more challeng-
                             ing and more critical. The next sections ­will situate trade secrets within the larger
                             intellectual property landscape (Section 1.2) and explain how courts de --- ine and sa --- e-
                             guard this oldest-­yet-­ever-­evolving  --- orm o ---  IP.



                                              1.2. Trade Secrets Within the
                                            Intellectual Property Framework
                                Trade secrets occupy one corner o ---  a larger intellectual property landscape that
                             also includes patents, copyrights, and trademarks. ­These other  --- orms o ---  IP typically
                             rely on some ­measure o ---  public disclosure or vis­i­ble use to secure rights. Patents
                             require public disclosure o ---  an invention in exchange  --- or a time-­limited mono­poly.
                             Copyrights protect original expressions and o --- ten assume wide distribution o ---  ­those
                             works. Trademarks  --- ocus on public identi --- ication and distinctiveness in commerce.
                             By contrast, trade secrets demand silence. They require no registration or govern-
                             ment  --- iling. Their protection continues  --- or as long as the in --- ormation remains con --- i-
                             dential and yields economic value to its ­owner. This section compares and contrasts
                             trade secrets with each o ---  the other IP types, highlighting why some businesses
                             choose secrecy while ­others lean on patents, copyrights, or trademarks —­ or a mix-
                             ture o ---  them all.


                             1.2.1. Trade Secret vs. Patent
                                 Patents and trade secrets both shield innovation but adopt opposing approaches.
                             A patent discloses the technology ­behind an invention so the public can learn  --- rom
                             it, in exchange  --- or an exclusive right —­ generally lasting 20 years —­ to block ­others

rom making, using, selling, or importing that invention. Trade secrets, on the other hand, demand that you hide the critical details. I — the innovation is discovered in­de­ pen­dently or reverse engineered, you cannot stop the new user by citing trade secret law. I — someone simply — igures out the ­recipe, you are out o — luck. By contrast, a patent can block even innocent third parties who arrive at the same invention on their own. Whether to disclose in — ormation in pursuit o — a patent, or to keep a process hid- den as a trade secret, is a strategic choice. I — an invention is easy to reverse engineer, secrecy may not protect it ­because competitors can unlock the idea by studying the


inal product. In that scenario, a patent might be ­better —­ disclosure is — orced, but it stops copycats — or a ­limited term. Conversely, i — the invention can — easibly stay hid- den (like a — actory ­process or an internal algorithm) and has potential value beyond 20 years, secrecy could be advantageous. ­Owners then skip the cost and lengthy procedure o — patent prosecution and avoid revealing details to the public. However, they do — ace the downside risk that i — someone ­else discovers the same method in­de­ pen­dently, ­there is no recourse ­under trade secret law.

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 10 1/12/26 2:51 PM 1 • Understanding Trade Secret Law 11

                   A practical compromise involves patenting certain core aspects o ---  a technol-
                ogy while still treating re --- inements, negative data, or unpatentable  --- eatures as trade
                secrets. This approach ensures some exclusive rights via patent law while other
                knowledge stays con --- idential within the  --- irm. However, care is needed when dra --- ting
                patent applications or marketing materials so that you do not accidentally disclose
                too much and destroy your secrecy.


                1.2.2. Trade Secret vs. Copyright
                   Copyright law sa --- eguards original create expressions that are  --- ixed in a tangible
                medium, such as novels, ­music,  --- ilms, computer code, or even a painting’s speci --- ic
                arrangement o ---  lines and shapes. It arises immediately upon creation and does not
                require any degree o ---  secrecy. In  --- act, copyrighted works are o --- ten widely published
                and distributed to reach an audience. The copyright ­owner can sue anyone who
                makes unauthorized copies or adaptations o ---  the expression.
                    Trade secrets revolve around maintaining con --- identiality. They protect what lies
                ­behind the vis­i­ble expression, such as the undisclosed logic in a so --- tware algorithm
                 or the exact combination and settings o ---  equalizers and compressors that a producer
                 uses to shape the sound o ---  a song via a music studio production. Once you release a
                 copyrighted work to the public, you cannot claim that its core contents remain hid-
                 den —­ even i ---  the public ­ --- aces license restrictions, the expression itsel ---  is “out ­there.”
                 For trade secret status to endure, you must show that you took real steps to keep the
                 relevant details  --- rom becoming general knowledge.
                   Even so, you can combine both systems. A developer might copyright a  --- inished
                program’s user inter --- ace and compiled object code, then keep the source code a
                secret. I ---  a competitor obtains that source code via improper means —­ say, by hack-
                ing or by betrayal o ---  a non-disclosure agreement (NDA) —­ both copyright in --- ringe-
                ment (i ---  they literally copied the text) and trade secret misappropriation (i ---  they
                exploited the hidden logic) could apply. But i ---  a rival writes its own  --- unctionally
                similar code that uses the same ideas but not the same expression, copyright might
                not help at all, while trade secret law could still address ­whether ­those ideas ­were
                gained improperly.


                1.2.3. Trade Secret vs. Trademark
                   Trademarks help consumers identi --- y a product or ­service. Their entire value  --- lows

rom public visibility: a brand name, a logo, or a slogan must be “out in the open” so customers see it and distinguish it — rom competing marks. Trade secrets thrive in concealment. Yet, in practice, trademarks and trade secrets o — ten coexist: a — amous trademark can rest on a well-­promoted brand name while the ­process that creates that brand’s distinctive product remains hidden. One iconic example is Coca-­Cola: the name and logo are trademarks known worldwide, while the secret — ormula is protected only by corporate silence.

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 11 1/12/26 2:51 PM 12 1 • Understanding Trade Secret Law

                                               Trademark and Trade Secret Formula
                                                           Together

                                                           Coca-­Cola Bottling Co. v. The Coca-­Cola Co.
                                                                    269 F. 796 (D. Del. 1920)
                                 In this early dispute, i­ndependent bottlers challenged The Coca-­Cola Com­
                                 pany’s trademark and exclusive control o ---  its secret syrup  --- ormula. The court
                                 recognized that Coca-­Cola’s name and logo  --- unctioned as a  --- amous trade-
                                 mark, even while the syrup’s exact ­recipe remained a protected secret. Coca-­
                                 Cola had never publicly disclosed the precise blend o ---

lavoring oils and other ingredients. By keeping the — ormula hidden and requiring strict con — idential- ity among bottlers, Coca-­Cola preserved a trade secret that complemented its strong brand identity. The ruling emphasized that trademark law protects the public-­ — acing symbol o — a product, whereas trade secret law shields the behind-­ the-­scenes method or ­recipe. As a result, Coca-­Cola could leverage both — orms o — intellectual property: the trademark drew consumers to a recognizable bev- erage, while the undisclosed — ormula kept rivals — rom duplicating the drink’s taste. This combination o — secrecy and branding became a — oundational model


or other companies seeking dual protection.

                                Sometimes, a com­pany keeps an upcoming brand identity a secret ­until a prod-
                            uct’s launch. That pre-­launch name or logo might  --- unction as a “trade secret” to pre-
                            vent early leaks. But once the trademark is revealed publicly, any secrecy ­behind it
                            ends. Meanwhile, the brand might represent a product whose special  --- eatures remain
                            locked away  --- rom the competition. In that sense, trademarks and trade secrets work
                            side by side: one is broadcast to the marketplace, and the other is guarded within the
                            ­organization.


                            1.2.4. Trade Secrets in the IP Landscape
                               Patents, copyrights, trademarks, and trade secrets each protect di --- ­ --- er­ent kinds
                            o ---  value. Patents reward inventors  --- or disclosing new inventions. Copyrights grant
                            exclusive rights in creative works. Trademarks enhance brand recognition and con-
                            sumer trust. Trade secrets preserve hidden methods or data that yield an advantage
                            by virtue o ---  not being generally known.
                               Some businesses patent or trademark the public-­ --- acing aspects o ---  their products
                            while keeping behind-­the-­scenes practices secret. ­Others  --- orgo the patent system
                            entirely i ---  they believe they can maintain secrecy longer than a 20-­year patent term.
                            Still ­others rely on copyrights  --- or original expression but retain trade secret protec-
                            tion  --- or the knowledge ­behind that expression. The choice depends on many ­ --- actors,

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 12 1/12/26 2:51 PM 1 • Understanding Trade Secret Law 13

                 including how easily competitors might reverse engineer a product, ­whether the
                 invention meets patentability standards, and ­whether disclosure could spur unwanted
                 competition.
                     In the  --- ollowing sections, we ­will examine exactly how law de --- ines a trade secret
                 (Section 1.3), how misappropriation arises (Section 1.4), and how businesses can

orti — y their con — idential in — ormation against improper exposure. Understanding trade secrets in this broader IP — ramework lets you see why companies might choose silence as part o — their innovation strategy —­ and why that silence must be accompa- nied by consistent, care — ully managed e —


orts to keep the secret — rom escaping.

                                     1.3. De --- ining a Trade Secret:
                                     The Three Essential Ele­ments
                    Trade secret law hinges on three essential requirements. First, the subject ­matter
                 must quali --- y as “in --- ormation.” Second, that in --- ormation must hold ­independent eco-
                 nomic value precisely ­because it is not generally known and not readily ascertainable
                 by proper means. Third, the business that seeks protection must undertake reason-
                 able e ---

orts to keep the in — ormation con — idential. Although ­these ele­ments appear straight — orward, courts weigh them care — ully. Each ­ — actor plays a crucial part in deter- mining ­whether knowledge genuinely deserves ­legal sa — eguards as a trade secret. This section explores ­these requirements step by step, examining what kinds o —

                 “in --- ormation” can receive protection, how businesses can prove that their in --- orma-
                 tion remains unknown and o ---

ers a competitive edge, and why only ­those who actively guard their secrets can invoke the protections o — trade secret law. Understanding ­these criteria illuminates the care — ul balancing that courts per — orm between promot- ing — air competition and punishing dishonest acts o — the — t or breach o — con — idence.

                 1.3.1. In --- ormation
                    A trade secret claim begins with the assertion that speci --- ic content quali --- ies as
                 “in --- ormation.” Statutes such as the UTSA and the  --- ederal DTSA de --- ine this term
                 in broad, inclusive language encompassing  --- ormulas, patterns, compilations, pro-
                 grams, devices, methods, techniques, pro­cesses, and similar intangible knowledge.
                 Consequently, “in --- ormation” may re --- er to anything  --- rom chemical  --- ormulas or
                 advanced algorithms to marketing plans or specialized data sets. The key point is
                 that courts  --- ocus on the intangible content, not on a physical object or an employee’s
                 personal skill.
                     Many companies rely on technical trade secrets, such as manu --- acturing pro­cesses,
                 ­recipes, or engineering designs. A com­pany might also have business trade secrets,
                  including strategic plans, sales tactics, or curated customer lists. O --- ten, a single

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 13 1/12/26 2:51 PM 14 1 • Understanding Trade Secret Law

                            enterprise relies on multiple types o ---  con --- idential knowledge to stay ahead o ---  rivals.
                            For example, a phar­ma­ceu­ti­cal  --- irm might keep one set o ---  secrets tied to a produc-
                            tion ­process, another set related to the identity o ---  specialized suppliers, and a third
                            set involving results  --- rom negative research. All o ---  ­these might quali --- y as protected
                            “in --- ormation,” provided they are both novel to outsiders and deliberately hidden  --- rom
                            general circulation.
                               Trade secret law does not treat broad, nebulous concepts as “in --- ormation.” I ---  the
                            alleged secret is merely an idea that any skilled person in the  --- ield would conceive,
                            courts ­will reject it as too abstract. The ­owner must show that the knowledge is su ---

i- ciently concrete and detailed. In some cases, a single concept or notion might straddle the line between a protectable method and an unprotectable idea. Courts ­will look to see ­whether the claimant can articulate precise steps, — ormulas, or data that di —


erenti- ate the secret — rom everyday industry knowledge.

                                           Separating Concepts  --- rom Concrete Data

                                                 Altavion, Inc. v. Konica Minolta Systems Laboratory, Inc.
                                                                226 Cal. App. 4th 26 (2014)
                                 Altavion alleged that a general idea  --- or embedding secure barcodes in docu-
                                 ments was a trade secret. The court distinguished between broad conceptual
                                 statements (such as “use barcodes  --- or authentication”) and the speci --- ic under­
                                 lying algorithms, designs, and implementations that Altavion kept con --- iden-
                                 tial. The general concept alone was deemed too vague  --- or protection. However,
                                 the court  --- ound that once Altavion provided detail on how exactly it coded and
                                 integrated the barcodes, that narrower, concrete content quali --- ied as in --- orma-
                                 tion. This ruling shows that courts demand de --- inable  --- acts or methods, not
                                 merely a creative notion or aspiration.



                               A second point o ---  emphasis is that employees’ general know-­how or skill is not
                            “in --- ormation” in the sense o ---  a trade secret. Over time, workers accumulate exper-
                            tise, develop pro --- essional judgment, and learn standard techniques. Courts ­will not
                            prevent employees  --- rom using their accumulated competencies, even i ---  they sharp-
                            ened them while working  --- or one employer. What counts as a secret must go beyond
                            typical skill or routine knowledge. I ---  a departing worker takes a con --- idential  --- ormula
                            or proprietary blueprint, that crosses the line. But i ---  they merely recall and use typi-
                            cal design princi­ples known throughout the industry, courts treat it as part o ---  their
                            general skillset.
                              Fi­nally, trade secret law does not require the alleged secret to be recorded on
                            paper or stored in a database. An individual might hold the knowledge purely in

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 14 1/12/26 2:51 PM 1 • Understanding Trade Secret Law 15

                memory, and as long as the method or  --- ormula remains genuinely undisclosed, it
                can still be protectable. Many older pre­ce­dents re --- erence trade secrets passed ver-
                bally between employees ­under an implicit or explicit expectation o ---  con --- idential-
                ity. ­Today’s world mostly uses digital repositories, but the princi­ple remains that
                intangible substance —­ the ­actual data, design, or ­process —­ ­matters more than the
                medium. What remains crucial is that the ­owner can ­later de --- ine and describe it with
                enough speci --- icity  --- or a court to see how it di ---

ers — rom everyday skill and unpro- tected knowledge.

                1.3.2. ­Independent Economic Value  --- rom
                       Not Being Generally Known and Not
                       Readily Ascertainable
                    The second prong captures two closely connected requirements. The secret must
                possess value ­because it is not generally known, and it must not be so easily discov-
                erable by law --- ul means that secrecy con --- ers no real advantage. Courts usually group
                t­hese concepts by asking ­whether the ­owner truly gains a meaning --- ul competitive
                 edge by keeping ­others in the dark or ­whether a rival could law --- ully replicate the
                 in --- ormation with trivial e ---

ort. I — the secrecy does not ­matter to the in — ormation’s economic utility or i — a competitor can reverse engineer the solution with minimal trou­ble, the law sees no cause — or trade secret protection.

                    1.3.2.1. Independent Economic Value
                    Trade secret law requires that the in --- ormation at issue derive ­independent eco-
                nomic value  --- rom remaining con --- idential. This means the in --- ormation must be
                valuable precisely ­because other potential users do not know it. I ---  every­one in the

ield already understands or can — reely access the same content, secrecy cannot add anything to its economic worth. Thus, many businesses highlight how exclusive knowledge saves costs, enables better products, or opens new markets. They might show how a trade secret shortens development time, yields superior ­per — ormance, or protects pricing strategies, all o — which translate to a head start or competitive advantage. Conversely, i — the knowledge does not meaning — ully advance the ­owner’s e —


iciency or revenue, or i — it is trivial, the law sees no strong reason to treat it as a protectable secret. ­Owners typically demonstrate “­independent economic value” by explaining how competitors would gain a signi — icant bene — it i — they learned the secret or how the ­owner would su —


er losses i — the in — ormation leaked. Courts o — ten accept direct testi- mony supported by some — actual demonstration, like development costs, special pro- duction methods, or time saved by skipping trial-­and-­error phases, that the secrecy grants a real business edge.

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 15 1/12/26 2:51 PM 16 1 • Understanding Trade Secret Law

                                              Economic Value in Nonpro --- it Contexts

                                                             Religious Tech. Ctr. v. Lerma
                                                           908 F. Supp. 1362 (E.D. Va. 1995)
                                 The Church o ---  Scientology sued over internet postings o ---  its “Operating Thetan”
                                 materials, claiming that they ­were valuable trade secrets. The court noted that
                                 the Church sold the esoteric teachings only to quali --- ied adherents who paid

ees and pledged con — identiality. By limiting access, the Church maintained that ­these texts derived monetary worth — rom remaining undisclosed. Critics argued that the spiritual nature o — the content made it ill-­suited — or commercial protec- tion. The court, however, evaluated the alleged “­independent economic value” by examining the Church’s business model o — licensing and — ees, indicating that intangible or non-­technical material can still quali — y i — it con — ers a tangible ben- e — it — rom secrecy. Although the ultimate dispute involved constitutional and


air-­use arguments, the case underscored how an ­organization’s care — ul restric- tion o — potentially “religious” content can — all ­under the umbrella o — trade secret law i — it demonstrates economic importance linked to con — identiality.

                               In short, the heart o ---  “­independent economic value” is the link between secrecy
                            and commercial bene --- it. A com­pany may show that the secret knowledge is expensive
                            or time-­intensive to replicate, that only a  --- ew insiders have it, and that disclosing it
                            would hand rivals a shortcut. As soon as other players can obtain and use the same
                            in --- ormation, its exclusivity —­ and thus its competitive worth —­ evaporates. This prong
                            ensures that only meaning --- ul secrets o ---  genuine commercial signi --- icance, rather than
                            general or incidental knowledge, earn the shield o ---  trade secret protection.


                                 1.3.2.2. Not Generally Known
                                “Not generally known” means the in --- ormation is not widely recognized or pub-
                            lished in the relevant  --- ield. Courts do not require absolute invisibility. A small circle
                            o ---  ­people might be aware o ---  the data, yet it can still be a secret i ---  they learn it ­under
                            con --- identiality obligations or i ---  the group remains too small to nulli --- y the ­owner’s
                            advantage. However, i ---  many competitors in­de­pen­dently use the same approach or i ---

                            the technique appears in readily accessible industry re --- erences, the knowledge ceases
                            to be a secret.
                               This  --- ocus on “not generally known” underlies the princi­ple that trade secret law
                            rewards businesses that keep a competitive insight to themselves. I ---  the insight is
                            already spreading  --- reely, secrecy is not what makes it valuable. In practice, the lines
                            can blur. One enterprise might share certain details selectively with partners ­under
                            strict NDAs or pre­sent partial glimpses to potential investors. ­These controlled dis-

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 16 1/12/26 2:51 PM 1 • Understanding Trade Secret Law 17

                closures do not automatically destroy secrecy i ---  they preserve con --- identiality. But i ---

                the in --- ormation appears widely —­  --- or instance, in a patent  --- iling or a public regulatory
                submission —­ the law deems it general knowledge.
                   Courts also ask ­whether a competitor, upon hearing vague re --- erences, could locate
                the same data in public sources. I ---  the answer is yes, the material is e ---

ectively known. Some ­owners attempt to hide an innovation ­behind licensing or restricted distribu- tion. But i — the product is widely sold and includes enough clues or is accompanied by manuals that detail the innovation, a court might conclude that the knowledge is


unctionally public. The key consideration is ­whether the secrecy e —


ectively keeps the knowledge restricted to a small, controlled circle that cannot — reely pass it along.

                                                           Value  --- rom ­L imited
                                                              Circulation

                                 Board o ---  Trade o ---  City o ---  Chicago v. Christie Grain & Stock Co.
                                                      198 U.S. 236 (1905)
                     In the early 1900s, the Board o ---  Trade compiled grain price quotations and
                     shared them only with paying subscribers ­under con --- identiality-­like condi-
                     tions. A competitor tried to publish ­these quotes, arguing they ­were not truly
                     secret. The Supreme Court disagreed, emphasizing that the Board’s practice o ---

                     limiting the data to authorized users preserved secrecy and value. Although
                     some subscribers possessed the in --- ormation, it was not “generally known”
                     ­because the Board never released it into a  --- ully open  --- orum. The Board’s care-

ul control sustained the advantage arising — rom restricted access, which sup- ported the conclusion that the data was protectable.

                   To show that the in --- ormation is not generally known, ­owners o --- ten pre­sent evi-
                dence o ---  their internal security policies, ­limited distribution, and explicit instructions
                to recipients about con --- identiality. This helps persuade courts that the knowledge
                remains in a de --- ined circle rather than having spilled across the entire industry.
                Equally impor­tant is demonstrating that no legitimate publication or public discus-
                sion has sur --- aced which might de --- eat a secrecy claim.


                    1.3.2.3. Not Readily Ascertainable
                   Closely related to being “not generally known” is the question o ---  ­whether the
                in --- ormation is “not readily ascertainable.” I ---  a competitor can law --- ully discover the
                secret with minimal e ---

ort, the secrecy advantage collapses. Common law — ul meth- ods include ­independent creation, reverse engineering, or research using public data. Trade secret law is built around the idea that no one can be prevented — rom stumbling

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 17 1/12/26 2:51 PM 18 1 • Understanding Trade Secret Law

                            on the same insight i ---  they do so honestly. It only punishes the --- t, deception, or breaches
                            o ---  con --- idence.
                               Reverse engineering has become a central  --- ocal point in technology-­driven indus-
                            tries. Purchasing a competitor’s widget, disassembling it, and analyzing its compo-
                            nents are considered  --- air game. I ---  ­doing so reveals the competitor’s once-­hidden
                            design, that design is not a protected secret in the eyes o ---  the law. The same logic
                            applies to so --- tware decompilation or cryptanalysis, though license agreements may
                            place additional contractual restrictions. Courts generally hold that i ---  the average
                            skilled competitor could replicate the ­process or outcome through public channels
                            and standard investigative methods, it is readily ascertainable and does not quali --- y

or trade secret protection. Yet i — the relevant method remains buried so deeply that an adversary would need extraordinary guesswork or a major research proj­ect to replicate it, the secrecy stands. A manu — acturing technique that requires specialized knowledge or extremely involved trial and error may remain secure — or years, even i — the — inal product is sold openly. This situation o — ten arises with intangible “know-­how” embedded in pro­ cesses that do not mani — est on the product’s sur — ace.

                                           Novel Combinations Can Be Trade Secrets

                                                               Hertz v. Luzenac Group
                                                            576 F.3d 1103 (10th Cir. 2009)
                                 Luzenac produced a talc product using common steps in a speci --- ic sequence
                                 that yielded superior ­per --- ormance. Former employees took that knowledge to
                                 a rival. At  --- irst, the court dismissed the claim, reasoning that each individual
                                 step was known in the industry. On appeal, the Tenth Cir­cuit concluded that
                                 combining t­hese steps in that par­tic­ul­ar way was not readily ascertainable.
                                 Since no competitor had success --- ully pieced the steps together on their own,
                                 the synergy o ---  steps held legitimate secrecy value. This highlights that even i ---

                                 the pieces are public, the unique assembly can remain protected i ---  it is not easy

or outsiders to deduce.

                               In e ---

ect, “not readily ascertainable” means that the secret-­owner does not rely on broad ignorance alone but also on the — act that legitimate channels o — discovery would be signi — icantly challenging. A rival’s inability to replicate the knowledge, short o — unethical or illegal conduct, supports the notion that secrecy has real worth. Con- versely, i — an opponent can replicate the in — ormation with a minimal investment o —

                            time or capital, secrecy cannot be said to drive the knowledge’s economic value.
                               When evaluating this prong, courts consider the cost, complexity, and typical capa-
                            bilities o ---  industry players. They do not require that a secret be absolutely impossible

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 18 1/12/26 2:51 PM 1 • Understanding Trade Secret Law 19

                to  --- igure out. Rather, the standard is that acquiring the secret  --- airly would require
                unusual or burdensome e ---

ort beyond what is considered routine or trivial. I — acquir- ing it is so easy that a competitor merely needs to buy the product and do a ­simple test, the ­owner cannot claim trade secret status — or that data or design.

                1.3.3. Subject to Reasonable E ---

orts to Maintain Secrecy The — inal requirement embodies a — undamental princi­ple: to deserve l­egal pro- tection, an ­owner must treat the in — ormation as secret. Courts do not automatically guard knowledge that a business — ails to secure. Rather, the law expects the claimant to adopt consistent, practical ­measures to ensure the in — ormation stays hidden. Failing to do so signals that the business itsel — did not regard the data as con — idential, so the public policy interest in protecting it diminishes. One common example is the use o — nondisclosure agreements (NDAs) — or any- one who might gain access to the knowledge. While NDAs alone are not a panacea, they re — lect a recognition that the in — ormation is special and must be shielded. Other


requent methods are labeling documents or — iles as “con — idential”; restricting physi- cal access to sensitive areas; implementing digital controls, like password-­protected servers; and keeping distribution on a “need-­to-­know” basis. The speci — ic steps vary widely depending on industry, scale, and the nature o — the secret. A small ­ — amily res- taurant might keep one copy o — its sauce ­recipe in a locked drawer, while a global tech com­pany invests in advanced cybersecurity. Nevertheless, courts want a consistent story. I — an ­owner brandishes NDAs but then — reely distributes the purported secret in brochures or marketing materials, that ­owner undermines the argument — or secrecy. Judges examine ­whether the business’s internal culture, training, and policy en — orcement align with the concept o — con — iden- tiality. When a leak occurs, the ­owner’s swi — t and decisive response can prove to the court that secrecy truly ­matters to the ­organization.

                                                      An NDA Is Not Enough

                                                           nClosures Inc. v. Block & Co.
                                                           770 F.3d 598 (7th Cir. 2014)
                     nClosures developed a metal iPad case and had a nondisclosure agreement
                     with a manu --- acturer. Despite this paperwork, the com­pany publicly showcased
                     designs and shared them widely without additional security ­measures. The court
                     re --- used to recognize trade secret status, explaining that simply having an NDA
                     is not enough when the ­owner’s ­actual conduct does not rein --- orce secrecy. By

ailing to consistently limit access or label materials as con — idential, nClosures

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 19 1/12/26 2:51 PM 20 1 • Understanding Trade Secret Law

                                 e ---

ectively treated its design as public in — ormation, so the law declined to treat it as protected.

                               Reasonable e ---

orts also must adapt over time. A data security approach that su —


iced years ago might be woe — ully inadequate ­today, especially in — ields prone to hacking or digital espionage. Companies that rely heavi­ly on trade secrets o — ten update security protocols, run internal audits, and ensure that employees remain mind — ul o — con — i- dentiality obligations. Courts look — avorably on periodic training sessions that educate sta —


on how to avoid accidental disclosures and on clear policies — or employees who depart the com­pany. I — a large — irm — ails to maintain even basic cybersecurity, it is more likely that a court ­will conclude the — irm did not truly act to keep the data secret. Some ­owners worry that excessive secrecy can hamper collaboration or marketing e —


orts. Yet the law’s requirement is not total lockdown but rather reasonableness. ­Limited disclosures to potential investors or licensees do not kill a trade secret so long as ­those disclosures are controlled by NDAs and explicit con — identiality rules. Distribution within the — irm is acceptable i — the recipients need the in — ormation — or legitimate tasks and i — internal controls prevent casual sharing. The overarching ques- tion is ­whether the business systematically indicates that the in — ormation is private and invests proportionate resources in keeping it out o — unauthorized hands. When a trade secret lawsuit arises, de — endants o — ten argue that the alleged secret was not “reasonably” protected. They may point to large numbers o — employees with unlimited access, a lack o — con — identiality markings on documents, or anecdotal evi- dence that man­ag­ers openly discussed the knowledge in public — orums. Plainti —


s ­counter by documenting the steps they took, such as locked o —


ices, restricted server permissions, mandatory NDAs, and immediate action against suspicious be­hav­ior. This — actual clash o — ten decides ­whether the court deems the secrecy claim genuine or per — unctory. The bottom line is that trade secret law rewards diligence. ­Owners who use NDAs, restrict access, mark documents, and swi — tly respond to potential leaks can demon- strate that they truly rely on secrecy. This approach, in combination with the other two ele­ments, establishes the strong — oundation needed to seek injunctions and damages i —

                            the secret is ­later stolen or misappropriated. Without ­these ­measures, a court is likely
                            to hold that the business did not do its part and thus cannot invoke ­legal protection.


                            1.3.4. Synthesizing the Three Ele­ments
                              In --- ormation deserving trade secret status must meet all three criteria si­mul­ta­
                            neously. It must be detailed enough to quali --- y as “in --- ormation,” not a broad or obvi-
                            ous idea. It must carry genuine economic weight arising  --- rom its obscurity, meaning

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 20 1/12/26 2:51 PM 1 • Understanding Trade Secret Law 21

                it is not generally known or readily discoverable through law --- ul methods. Fi­nally, the
                ­owner must actively preserve that obscurity through steady and reasonable e ---

orts rather than merely proclaiming secrecy ­a — ter the — act. Only when ­these ­ — actors align does the law step in to penalize thieves, deter unethical ex-­employees, and sa — eguard honest competition based on properly acquired knowledge. Trade secrets can last in­de — ­initely —­  — ar longer than patents —­ precisely ­because the law does not — ix an expiration date. That unique advantage goes hand in hand with the ­owner’s ongoing obligation. A single misstep, such as a public disclosure, can instantly destroy the secrecy. Once the in — ormation becomes — reely available, the advantage dis- solves. Additionally, a competitor who stumbles on the same method in­de­pen­dently or reverse engineers it through diligence commits no misappropriation. Thus, the entire mechanism o — trade secret law revolves around preventing wrong — ul acquisi- tion or betrayal, not halting legitimate research. By insisting on ­these three ele­ments, courts balance competing policy goals. They encourage businesses to develop valuable but hard-­to-­patent insights while preserv- ing the — reedom o — ­others to discover knowledge on their own. They also require ­owners to show genuine responsibility: i — a business invests in secrecy, the law invests in protecting it. This relationship — osters a culture in which companies care — ully clas- si — y and ­handle critical data and cultivate strategies to manage risk. Once a secret is recognized ­under ­these princi­ples, the next question is how the law de — ines and polices misappropriation. That topic ­will be explored in the next section, where the — ocus shi — ts to the line between — air competition —­ such as open-­market reverse engineering —­ and illicit acts that breach a duty o — con — identiality or rely on deceit. Understanding ­these ele­ments is essential background — or seeing where courts set the bound­aries and how trade secret disputes pivot on issues o — trust, wrongdoing, and commercial — airness.

                                           1.4. Misappropriation o ---

                                                 Trade Secrets
                   Misappropriation is the critical  --- ault line where trade secret rights meet real-­world
                wrongdoing. Even i ---  in --- ormation quali --- ies as a valid trade secret, ­there is no l­egal
                violation ­unless an individual or entity acquires, uses, or discloses the secret in an
                improper way. This emphasis on un --- air conduct preserves legitimate competition by
                allowing parties to discover the same knowledge in­de­pen­dently or reverse engineer a
                publicly available product. The law steps in, however, when someone crosses bound­
                aries o ---  trust or deception. This section explores how the statutes de --- ine misappro-
                priation, details the main categories o ---  improper be­hav­ior, explains how “use” and
                “disclosure” can become actionable, and concludes with the notion o ---  “proper means,”
                most notably reverse engineering and ­independent discovery.

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 21 1/12/26 2:51 PM 22 1 • Understanding Trade Secret Law

                            1.4.1. Statutory Foundations and
                                    Wrong --- ul Conduct
                               Modern US trade secret statutes, including the UTSA and the DTSA, de --- ine “mis-
                            appropriation” in ways that revolve around wrongdoing. ­These laws  --- ocus on ­whether
                            the trade secret was obtained by “improper means” or ­whether a party who had law --- ul
                            access to the secret went on to breach a duty in using or disclosing it. Courts label
                            misappropriation as unethical, dishonest, or un --- air conduct, in contrast to harmless
                            or authorized ways o ---  discovering the same in --- ormation.
                                Typically, a trade secret ­owner alleges misappropriation by showing that the de --- en-
                            dant ­either stole or spied on the in --- ormation (improper acquisition) or exceeded the
                            scope o ---  authorized access (improper use or disclosure). In each instance, courts look

or the crossing o — a line —­ some ele­ment o — trickery, breach o — contract, or knowing violation o — the right — ul ­owner’s expectations. I — the de — endant’s discovery is entirely ­independent or arises — rom a product openly sold, liability usually cannot attach. Trade secret law’s equitable origins are crucial ­here. A party who knowingly sub- verts commercial morality (the common law’s equitable norm o —


air competition and honest dealing in commerce) by deceiving or betraying trust ­will likely — ace liability. This princi­ple underpins the entire — ramework. It ensures that employees can gain specialized knowledge on the job and still move within the industry, provided they do not exploit or reveal ­actual secrets in direct violation o — a ­legal or ethical duty.

                            1.4.2. Improper Acquisition
                               Improper acquisition may be the most blatant  --- orm o ---  misappropriation. It encom-
                            passes actions such as the --- t, trespass, hacking, bribery, or espionage —­ any deliberate
                            method o ---  bypassing the trade secret ­owner’s sa --- eguards. ­Whether the secret was
                            stored physically or digitally, the question is ­whether the de --- endant achieved access
                            through deceptive or unauthorized means.



                                           Aerial Espionage as Improper Acquisition

                                                           E. I. du Pont de Nemours & Co. v. Christopher
                                                                    431 F.2d 1012 (5th Cir. 1970)
                                 In this  --- requently cited case, du Pont was constructing a chemical plant with
                                 a partially open roo --- . Christopher took aerial photo­graphs o ---  the  --- a­cil­it­y to
                                 discover its manu --- acturing ­process. The Fi --- th Cir­cuit condemned this con-
                                 duct as industrial espionage, concluding that  --- lying overhead to circumvent
                                 du Pont’s reasonable security ­measures was an improper means o ---  acquiring
                                 the trade secret. The court’s decision underscores how even clever yet law --- ul

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 22 1/12/26 2:51 PM 1 • Understanding Trade Secret Law 23

                     tactics —­ like renting a spy plane —­ can become actionable when they e ---

ectively subvert the ­owner’s secrecy e —


orts.

                    Bribery or inducement to breach a nondisclosure agreement also quali --- ies as
                improper acquisition. For example, a competitor might pay a current employee to
                leak con --- idential documents. The competitor’s knowledge that the insider is violating
                a duty su ---

ices to prove wrongdoing. A more subtle scenario might involve posing as a potential partner or investor ­under — alse pretenses just to extract valuable in — orma- tion. Once the — acade is exposed, a court can hold that the de — endant’s actions ­were illegitimate. Signi — icantly, courts look beyond the direct thie — . I — another person knowingly receives the stolen in — ormation and exploits it, that person commits misappropria- tion. A person who exploits a stolen trade secret cannot claim ignorance i — the cir- cumstances raise red — lags, such as a suspiciously low “sale” price — or the data or the presence o — obvious con — identiality markings. By extending liability, the law deters conspiracies and a — ter-the- — act pro — iteers.

                1.4.3. Improper Use
                   Even when acquisition was initially authorized, misappropriation can arise through
                “improper use.” ­Here, the person in possession o ---  the trade secret goes beyond the
                scope o ---  any permitted purpose. Perhaps they acquired the in --- ormation ­under a con-

identiality agreement or in the context o — l­imited research. I — they then deploy the secret in ways the ­owner never agreed to, the law regards it as misappropriation. For instance, a technician might be hired to re — ine a manu — acturing method ­under strict nondisclosure terms. I — that technician ­later — orms a rival startup and employs the exact method — or personal gain, it counts as improper use. Courts typically scru- tinize the original context o — the relationship —­ particularly written agreements that de — ine how — ar the authorized use extends. A nondisclosure agreement (NDA) or license might say, “You may use this secret only to produce X — or us, no other uses are permitted.” Any usage outside that clause can become grounds — or litigation.

                        Improper Use o ---  Properly Acquired In --- ormation

                                                                 3M Co. v. Pribyl
                                                           259 F.3d 587 (7th Cir. 2001)
                     In this case, several  --- ormer employees le --- t 3M to  --- orm a rival venture called
                     Accu‑Tech Plastics. While at 3M, they had legitimate access to its technical man-
                     uals and operating procedures, which detailed resin  --- ormulations and precise

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 23 1/12/26 2:51 PM 24 1 • Understanding Trade Secret Law

                                 methods  --- or producing specialized plastics. However, once they started Accu-­
                                 Tech, they directly incorporated t­hese con --- idential pro­cesses into their new
                                 enterprise. The Seventh Cir­cuit  --- ound that although the employees obtained
                                 3M’s procedures law --- ully in their prior roles, their subsequent application o ---

                                 the same proprietary steps to build a competing business was an unauthorized
                                 use o ---  trade secrets.
                                    ­Because the employees knew 3M’s pro­cesses ­were secret and had signed
                                 con --- identiality obligations, the court emphasized that their actions clearly
                                 went beyond permissible use. That knowledge belonged to 3M  --- or its own
                                 production advantage and was not to be repurposed at a new com­pany with-
                                 out permission. In ruling  --- or 3M, the court enjoined Accu-­Tech’s continued
                                 exploitation o ---  the procedures and awarded damages re --- lecting the head start
                                 gained by circumventing the normal learning curve. 3M Co. v. Pribyl illustrates
                                 that even when acquisition is initially legitimate, reusing secret knowledge in
                                 an unapproved venture can constitute misappropriation.



                               ­Measuring damages or injunction scope in improper ­use cases can be complicated,
                            as the de --- endant likely had partial or temporary rights. Courts may restrict them  --- rom

urther use — or a set “head start” period or ­until the advantage gained — rom the breach dissipates. They might also assess monetary relie — —­ lost pro — its, unjust enrichment, or a reasonable royalty —­  — or the unauthorized bene — it the de — endant derived. The key remains that the de — endant’s usage exceeded ­whatever was originally authorized, and they knew or should have known that it ­violated the ­owner’s expectations.

                            1.4.4. Improper Disclosure
                                A similarly damaging variant o ---  misappropriation arises when a party who knows
                            the secret reveals it to others without license to do so. Even a single disclosure to
                            a competitor can unravel years o ---  investment i ---  that competitor can immediately
                            exploit the knowledge. When disclosure reaches the public domain, the secret’s
                            entire advantage typically vanishes. By imposing liability  --- or unauthorized disclo-
                            sure, the law encourages anyone entrusted with con --- idential knowledge to preserve
                            it care --- ully.
                                Wrong --- ul disclosure o --- ten appears in employee departure scenarios. An employee
                            may email key documents to a personal account or keep a USB drive o ---  strategic  --- iles.
                            I ---  they share ­these  --- iles with their new employer or upload them online, they breach
                            their duty not to reveal them. The severity o ---  misappropriation can be even higher
                            when distribution is so broad that re-­sealing the knowledge is impossible. Courts
                            react strongly, o --- ten ordering injunctions, awarding damages, and punishing mali-
                            cious intent with enhanced remedies.

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 24 1/12/26 2:51 PM 1 • Understanding Trade Secret Law 25

                                       Wrong --- ul Inducement to Disclose
                                          Con --- idential In --- ormation

                                 Board o ---  Trade o ---  City o ---  Chicago v. Christie Grain & Stock Co.
                                                      198 U.S. 236 (1905)
                     In this early Supreme Court decision, the Chicago Board o ---  Trade provided
                     grain price quotations exclusively to a ­limited group o ---  paying subscribers ­under
                     strict con --- identiality terms. A competitor induced insiders to disclose this in --- or-
                     mation, thereby making the data publicly accessible. The Court  --- ocused on the
                     act o ---  disclosure itsel ---  as the critical wrongdoing rather than on how the in --- or-
                     mation was acquired or used subsequently. This case set a pre­ce­dent by holding
                     that deliberately breaching a con --- identiality arrangement through unauthorized
                     disclosure is su ---

icient to trigger liability ­under trade secret law.

                    Disclosure can also be negligent or reckless rather than intentional. An ­organization
                might post sensitive source code online by ­mistake or might neglect to redact trade
                secret details  --- rom a regulatory  --- iling. While an errant slip might not always re --- lect
                malicious conduct, courts o --- ten treat it as destructive to secrecy i ---  the code or data
                truly become public. The question is ­whether the de --- endant had a clear duty (con-
                tractual or ethical) to avoid exposing the in --- ormation but disregarded that obligation.
                I ---  so, liability likely  --- ollows, although the remedy may vary depending on intent and
                consequences.



                                        Improper Disclosure o ---  Properly
                                             Acquired In --- ormation

                                               MicroStrategy, Inc. v. Business Objects, S.A.
                                                  331 F. Supp. 2d 396 (E.D. Va. 2004)
                     In this case, MicroStrategy asserted that its  --- ormer employees, who ­were
                     bound by con --- identiality agreements, improperly disclosed sensitive internal
                     documents to Business Objects. The documents at issue included MicroStrat-
                     egy’s “Business Objects Competitive ­Recipe” and a volume discount schedule.
                     MicroStrategy had taken extensive ­measures to keep both secret. The court

ound that t­hese materials ­were not publicly available and could only have been obtained through a breach o — the employees’ duty o — con — identiality. As a result, Business Objects was enjoined — rom possessing, disclosing, or using the misappropriated documents. This case illustrates that even when in — orma- tion is acquired properly or indirectly ( — or example, via — ormer employees),

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 25 1/12/26 2:51 PM 26 1 • Understanding Trade Secret Law

                                 any unauthorized  --- urther disclosure that undermines the ­owner’s e ---

orts to maintain secrecy constitutes misappropriation.

                               Unauthorized disclosure is particularly damaging when it renders a secret no lon-
                            ger secret. Once con --- idential in --- ormation is disseminated widely, the ­owner’s exclu-
                            sive advantage evaporates. Courts are there --- ore quick to enjoin  --- urther disclosures
                            and, in many cases, award damages that re --- lect the loss o ---  the secret’s economic value.


                            1.4.5. Proper Means: Reverse Engineering
                                    and ­Independent Discovery
                                Trade secret law does not create a mono­poly over knowledge. Competitors remain
                            ­ --- ree to discover or replicate a secret i ---  they do so by honest methods —­ commonly by
                             reverse engineering a purchased product or conducting original R&D. ­Owners who
                             choose secrecy over patenting accept the risk that, once a product is sold openly,
                             skilled rivals might analyze and deduce the hidden aspects.


                                 1.4.5.1. Reverse Engineering
                               Reverse engineering re --- ers to examining and dismantling a legitimate copy o ---  an
                            item to understand its workings. As long as it was obtained law --- ully on the market,
                            trade secret law deems this approach permissible. I ---  the original ­owner wanted to
                            keep the details hidden, they might have used physical security (potting compound
                            in electronics,  --- or instance) or contractual limits (shrink-­wrap or labeling disclaim-
                            ers that bar reverse engineering). These restrictive covenants ultimately depend on
                            contract-law principles o ---  assent and en --- orceability. A shrink-wrap or click-through
                            license may validly bar reverse engineering, but a unilateral label typically does not,
                            and even a valid agreement can be void i ---  it con --- licts with public policy. Where no
                            such ­measure or contract precludes analy­sis, the competitor may replicate the design.



                                                           The Right to Reverse Engineer

                                                           Bonito Boats, Inc. v. Thunder Cra --- t Boats, Inc.
                                                                       489 U.S. 141 (1989)
                                 In invalidating a Florida statute that prohibited copying boat hull designs, the
                                 Supreme Court rea ---

irmed the policy that absent patent protection, a product released publicly is — air game — or reverse engineering. The Court reasoned that states cannot grant a de — acto perpetual mono­poly by banning law — ul investi-

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 26 1/12/26 2:51 PM 1 • Understanding Trade Secret Law 27

                     gative methods. Trade secret ­owners must adopt their own sa --- eguards i ---  they
                     wish to keep knowledge hidden.



                   Any attempt to label normal analy­sis or testing as “improper acquisition” typically

ails ­unless the ­owner can show a breach o — contract or an extraordinary in — iltration tactic, — or example, aerial espionage used to photograph a plant under construction to glean process details. Courts encourage reverse engineering as a driver o — innovation and competition, balancing the secrecy-­based regime. Once the competitor obtains the data — rom the product itsel — , no misappropriation claim can stand, provided no NDAs or license restrictions exist.

                    1.4.5.2. Independent Discovery
                    A similarly valid ave­nue is in­de­pen­dently creating or discovering the same knowl-
                edge. Nothing in trade secret law grants the  --- irst developer an automatic mono­poly
                i ---  a second developer invests time and skill to reach the same solution. The second
                developer need not pay royalties or  --- ace litigation i ---  they never accessed the  --- irst com­
                pany’s data. Plainti ---

s trying to prove misappropriation must show the de — endant’s knowledge was tainted by improper means or a breach o — duty, not merely that both parties ended up with alike results.

                                ­Independent Discovery as a Law --- ul Path

                                     Winston Research Corp. v. Minnesota Mining & M --- g. Co.
                                                  350 F.2d 134 (9th Cir. 1965)
                     In this historical dispute, Winston Research created a product resembling a
                     design by 3M. 3M alleged the --- t o ---  con --- idential in --- ormation. Winston, however,
                     showed documentation o ---  its own engineering pro­gress that paralleled 3M’s
                     developments without tapping into 3M’s proprietary data. The Ninth Cir­cuit
                     ruled that honest ­independent discovery does not constitute misappropriation.
                     ­Because Winston’s approach did not rely on secret disclosures, 3M’s claim  --- ailed.



                    By preserving reverse engineering and ­independent discovery as “proper means,”
                trade secret law encourages a dynamic marketplace. Businesses cannot rely on secrecy
                alone i ---  their product is easy to replicate once sold. Instead, they must weigh the pros
                and cons: ­either reveal the invention  --- or patent coverage or invest in robust internal
                ­measures that deter reverse engineering. In ­either case, the law ensures that  --- air com-
                 petition is not sti --- led and that cunning espionage or breach o ---  con --- idence is the real
                 target o ---  en --- orcement.

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 27 1/12/26 2:51 PM 28 1 • Understanding Trade Secret Law

                               Courts o --- ten examine evidence such as lab notebooks, timelines, or internal emails
                            to con --- irm that the second entity truly did the work themselves rather than piggy-
                            backing on the original secret.
                               ­Because misappropriation depends on the de --- endant’s knowledge that it is acting
                            improperly —­ a bona  --- ide second inventor who stumbles on the same method has no
                            liability —­ this  --- eature o ---  trade secret law also supports the choice some businesses
                            make to patent their inventions i ---  they  --- ear easy duplication. I ---  the trade secret is likely
                            to be discovered in­de­pen­dently or is embedded in a publicly sold product, relying
                            solely on secrecy might be a ­gamble.


                            1.4.6. Balancing Ethics and Competition
                               Trade secret misappropriation law attempts to strike a delicate balance. On one
                            side, ­owners should be able to share con --- idential knowledge internally (or with part-
                            ners) without surrendering their competitive advantage. On the other, competition
                            demands that no single  --- irm can lock down knowledge that rivals develop or discern
                            through legitimate methods. The line thus runs between ethical and unethical actions:
                            the --- t, breaches o ---  contract, and secret betrayals are punished, while open research and
                            honest observation are allowed.
                               By  --- ocusing on improper acquisition, use, or disclosure, courts preserve the right-

ul balance between encouraging investment in undisclosed knowledge and prevent- ing undue hindrance to ­independent or reverse-­engineered discoveries. This ethic is deeply rooted in older cases and persists in modern statutes. ­Under the UTSA and the DTSA, plainti —


s must show both that they possess a valid trade secret and that the de — endant’s means or motive was wrong — ul. Where ­these ele­ments coincide, the law steps in. Next, we examine the remedies available when a trade secret holder proves misap- propriation. These remedies range — rom injunctions to damage awards and some- times to punitive ­measures — or will — ul and malicious wrongdoing. ­These remedies rein — orce the system by helping to restore the ­owner’s position, punish unscrupulous tactics, and deter ­others — rom similarly breaching commercial morality.

                                               1.5. Remedies  --- or Trade Secret
                                                      Misappropriation
                              Trade secret law delivers protection through a set o ---  remedies that both deter
                            wrongdoing and compensate ­owners  --- or the harm caused by misappropriation.
                            When a court con --- irms that a party has wrong --- ully acquired, used, or disclosed a
                            protected secret, it can invoke a blend o ---  injunctions, damages,  --- ee awards, and other
                            equitable ­measures. This section explores how t­hese remedies operate ­under the

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 28 1/12/26 2:51 PM 1 • Understanding Trade Secret Law 29

                UTSA and the DTSA. It also highlights ways in which judges tailor relie ---  to  --- it the

acts, — rom halting production lines that rely on stolen knowledge to imposing royal- ties on — urther usage.

                1.5.1. Remedial Goals
                    The overriding purpose o ---  trade secret remedies is three --- old:
                       1. Stop  --- urther wrongdoing by enjoining ongoing or imminent
                          misappropriation.
                       2. Restore the ­owner’s position by awarding damages that approximate
                          lost pro --- its or the de --- endant’s unjust gains.
                       3. Deter malicious acts by allowing punitive damages and attorneys’  --- ee
                          awards in severe cases.
                   Trade secret ­owners need swi --- t action i ---  an opposing party threatens to disseminate
                or continues pro --- iting  --- rom the misappropriated data. At the same time, courts seek to
                avoid crippling legitimate competition. They there --- ore calibrate remedies to neutral-
                ize un --- air advantages while respecting good-­ --- aith market activities.


                1.5.2. Injunctive Relie ---

                   An injunction is o --- ten the most urgent  --- orm o ---  relie ---  ­because trade secrets lose
                value quickly once exposed. Preliminary injunctions stop de --- endants  --- rom exploiting
                or disclosing a secret while litigation un --- olds. A court may l­ater enter a permanent
                injunction i ---  it  --- inds liability proven at trial.
                   ­Under both the UTSA and the DTSA, plainti ---

s can request to enjoin “­actual or threatened misappropriation.” This language enables courts to intervene even without proo — that the de — endant has already disclosed or used the secret, provided ­there is a serious risk they soon ­will.

                    1.5.2.1. Preliminary Injunctions
                   To obtain a preliminary injunction in a civil lawsuit, a plainti ---

generally must establish the — our — actors required by Winter v. Natural Resources De — ense Council, Inc., 555 U.S. 7 (2008): (1) a likelihood o — success on the merits, (2) irreparable harm i — not granted, (3) the balance o — hardships ­ — avors the plainti —


, and (4) alignment with the public interest. Trade secret claimants o — ten meet the irreparable harm standard by demonstrating that once the secret is out, no monetary sum can — ully restore exclusivity.

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 29 1/12/26 2:51 PM 30 1 • Understanding Trade Secret Law

                                                   Preliminary Injunction to Prevent
                                                         Inevitable Disclosure

                                                           Bimbo Bakeries USA, Inc. v. Botticella
                                                               613 F.3d 102 (3d Cir. 2010)
                                 A high-­level baking executive had intimate knowledge o ---  Bimbo’s secret ­recipes.
                                 He accepted employment with a direct competitor, but the court recognized
                                 a risk that he could “inevitably” disclose key data in his new role. The Third
                                 Cir­cuit upheld a preliminary injunction blocking him  --- rom starting the new
                                 job. This outcome underscores how courts can step in even be --- ore disclosure
                                 occurs, provided the  --- acts suggest a genuine threat o ---  misuse.



                               A preliminary injunction grants the plainti ---

valuable breathing room. It ensures that the de — endant cannot commercialize or — urther spread the secret, which might other­wise undermine the entire reason — or litigating. I — the de — endant has begun pro- duction, the injunction may — reeze operations, impose a special monitor, or require immediate return o — con — idential — iles.

                                 1.5.2.2. Permanent and Tailored Injunctions
                               I ---  the plainti ---

establishes liability at trial, a permanent injunction may issue to pro- hibit continued misappropriation. However, courts sometimes must balance — airness. A de — endant who merged the misappropriated knowledge into a complex product might not be able to “unlearn” it. Judges occasionally cra — t “head start” injunctions, preventing usage — or the period it would have taken the de — endant to develop the secret law — ully.

                                                    Permanent Injunction to Prevent
                                                       Further Misappropriation

                                                            American Can Co. v. Mansukhani
                                                              742 F.2d 314 (7th Cir. 1984)
                                 In this landmark case, American Can Com­pany brought suit against its  --- or-
                                 mer executive, Mansukhani,  --- or misappropriating proprietary ink  --- ormulas
                                 and using them to manu --- acture competing products. The court  --- ound that
                                 Mansukhani had ­violated his duty o ---  con --- identiality by exploiting the secret

ormulas to gain a competitive advantage. As a remedy, the court granted a

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 30 1/12/26 2:51 PM 1 • Understanding Trade Secret Law 31

                     permanent injunction that barred Mansukhani  --- rom using or disclosing the
                     stolen  --- ormulas in any  --- urther business activities. The decision underscored
                     the critical role o ---  injunctive relie ---  in trade secret cases, emphasizing that once
                     con --- idential in --- ormation is misappropriated, preventing  --- urther use is essential
                     to protect the ­owner’s market position and sa --- eguard its investment in secrecy.



                   In exceptional circumstances, the UTSA permits courts to trans --- orm a strict ban
                into a reasonable royalty arrangement —­ particularly where en --- orcing a complete pro-
                hibition might in --- lict disproportionate hardship. This approach recognizes that some
                proj­ects, once deeply dependent on the stolen secret, cannot be easily dismantled. The
                de --- endant must pay ongoing royalties instead, e ---

ectively licensing what they wrong-


ully obtained, but at a court-­imposed rate rather than a negotiated one.

                1.5.3. Damages: Lost Pro --- its, Unjust Enrichment,
                        and Royalties
                   In addition to —­ or instead o ---  —­ an injunction, ­owners can seek damages  --- or the
                economic harm misappropriation caused. Courts applying the UTSA or the DTSA
                generally allow three primary calculations:

                       (1)	­actual loss,
                       (2) unjust enrichment, or
                       (3) a reasonable royalty.

                    Courts may adopt any ­measure that best captures the harm or ill-­gotten gains.


                    1.5.3.1 Actual Loss
                   ­Actual loss  --- ocuses on how the plainti ---

’s own business su —


ered. I — the de — endant used the secret to undercut prices, the ­owner may pre­sent sales or pro — it rec­ords showing that but — or the misappropriation, the plainti —


’s business would have cap- tured more revenue. Calculating such damages o — ten demands expert analy­sis and modeling o — what the ­owner’s position would have been without the wrong — ul con- duct. Another ­angle is the cost o — extra R&D or marketing needed to recover — rom the competitor’s sudden leap — orward. However, ­actual loss can be challenging to prove i — the plainti —


’s revenue drop stems — rom multiple market — ­actors or i — the timeline — or the competitor’s product launch is uncertain. De — endants typically argue that their success or the plainti —


’s slump was due to external market conditions, not the stolen data.

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 31 1/12/26 2:51 PM 32 1 • Understanding Trade Secret Law

                                 1.5.3.2. Unjust Enrichment
                               Where the de --- endant’s actions yield ­measurable pro --- its, courts may award ­those
                            gains as damages. This avoids letting a misappropriator retain bene --- its  --- rom cheat-
                            ing. The logic is that i ---  the de --- endant saved R&D time or other­wise reaped wind --- all
                            revenue, that advantage should revert to the right --- ul ­owner. Plainti ---

s might show that the de — endant slashed development costs or reached customers — aster, thereby securing pro — its it could not have earned but — or the secret.

                                              Money Damages  --- or Unjust Enrichment

                                                                     3M v. Pribyl
                                                             259 F.3d 587 (7th Cir. 2001)
                                 In this case, ex-­employees used 3M’s specialized manuals and manu --- actur-
                                 ing know-­how to start a competitor business. The court a ---

irmed that the de — endant’s swi — t market entry and pro — it signaled unjust enrichment — rom the secret knowledge. 3M’s internal procedures, though partly known in the indus- try, gained protectable status — rom their unique combination, and damages re — lected the competitor’s wind — all.

                                This ­measure can overlap with ­actual loss, but sometimes one ­measure is easier to
                            demonstrate. I ---  the de --- endant’s product soared in sales while the plainti ---

’s market share held steady, ­actual loss might appear minimal, yet the de — endant’s enrichment is substantial. Courts can pick whichever approach ensures equitable relie — .

                                 1.5.3.3. Reasonable Royalty
                               Courts sometimes turn to a “reasonable royalty” ­measure —­ essentially, imagining
                            a hy­po­thet­i­cal negotiation between the ­owner and the misappropriator  --- or licensed
                            use o ---  the secret. This approach is use --- ul when ­actual loss or unjust enrichment is
                            too speculative or cannot be  --- ully proven. However, the royalty must be supported
                            by evidence, not mere speculation. The judge or jury must base the estimate on rel-
                            evant  --- acts —­ such as comparable licenses, expert testimony, or market conditions —­ to
                            determine what  --- ee the de --- endant would likely have paid i ---  it had acted law --- ully.

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 32 1/12/26 2:51 PM 1 • Understanding Trade Secret Law 33

                                               Reasonable Royalty Award

or Misappropriation

                                     Altavion, Inc. v. Konica Minolta Systems Laboratory, Inc.
                                                    226 Cal. App. 4th 26 (2014)
                     In this case, Altavion, a small technology com­pany specializing in digital stamp-
                     ing methods, brought suit ­a --- ter Konica Minolta Systems Laboratory secretly

iled patent applications covering Altavion’s con — idential digital stamping tech- nology. Although Altavion had not patented its technology, it had disclosed detailed in — ormation ­under a nondisclosure agreement, thereby establishing that its methods had substantial economic value derived — rom their secrecy. The court rejected Konica Minolta’s argument that con — idential in — ormation could not yield a royalty-­based award, and it instead calculated damages using a reasonable royalty — ramework. This approach involved a hy­po­thet­i­cal nego- tiation to determine what Konica Minolta would have paid — or a license to legally use Altavion’s technology. The award underscored that even unpat- ented, eco­nom­ically valuable con — idential in — ormation merits compensation when misappropriated, thereby rein — orcing the princi­ple that a trade secret’s value is intrinsically linked to its restricted availability.

                    A royalty ­measure can apply where the de --- endant’s product only partially relies on
                the secret, or where the product has not yet hit the market but the the --- t is established.
                It also suits cases where equitable relie ---  alone does not su ---

ice and the court wants to ensure the plainti —


is compensated — or any advantage the de — endant retains.

                1.5.4. Enhanced Damages and Attorneys’ Fees
                   For egregious, will --- ul be­hav­ior, both the UTSA and the DTSA permit punitive or
                exemplary damages, o --- ten capped at double the compensatory sum. I ---  a court  --- inds
                that the de --- endant acted maliciously or engaged in knowing conspiracy, such height-
                ened awards punish wrongdoing and discourage ­ --- uture acts.



                            Punitive Damages  --- or Deliberate Conspiracy

                                                    Cognis Corp. v. Chemcentral Corp.
                                                    430 F. Supp. 2d 806 (N.D. Ill. 2006)
                     In a scenario where employees conspired to pass a chemical  --- ormula to a com-
                     petitor, the court concluded that their systematic cover-up and re --- usal to cease

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 33 1/12/26 2:51 PM 34 1 • Understanding Trade Secret Law

                                 exploitation warranted exemplary damages. Such an award signaled that trade
                                 secret the --- t accompanied by subter --- uge requires measures beyond compensa-
                                 tory remedies.



                               Attorneys’  --- ees are the costs a party pays to its lawyers  --- or litigating a case. Under
                            the American Rule, each side ordinarily bears its own  --- ees unless a statute, contract,
                            or court order provides otherwise.
                               Both the Uni --- orm Trade Secrets Act (UTSA) and the  --- ederal De --- end Trade Secrets
                            Act (DTSA) create limited exceptions to this rule. Each authorizes  --- ee shi --- ting in three
                            de --- ined circumstances:
                                    (1) when a claim o ---  misappropriation is made in bad  --- aith, allowing the de --- en-
                                        dant to recover  --- ees;
                                    (2) when a motion to terminate an injunction is made or resisted in bad  --- aith,
                                        allowing either party to recover; and
                                    (3) when will --- ul and malicious misappropriation is proven, allowing the pre-
                                        vailing plainti ---

to recover. These statutory mechanisms re — lect trade secret law’s equitable heritage and operate as reciprocal deterrents against bad- — aith litigation tactics on both sides. The DTSA — urther conditions recovery on prevailing-party status, a requirement that some — ederal courts have interpreted more narrowly than comparable provisions under the UTSA, particularly when a case is dismissed without prejudice.

                            1.5.5. Additional Equitable Remedies
                               Not ­every case o ---  misappropriation  --- its neatly into a standard remedy like dam-
                             ages or a blanket injunction. Sometimes, courts must cra --- t creative or  --- lexible equi-
                            table relie ---  to  --- it the nuances o ---  the wrongdoing and the harm. ­These “additional
                            equitable remedies” respond to the challenges o ---  unwinding entangled uses o ---  secret
                            in --- ormation, mitigating reputational damage, or restoring a semblance o ---  pre-­
                            disclosure secrecy. The goal is to eliminate any lingering un --- air advantage gained
                            through misappropriation, even when monetary compensation or basic injunctive
                            ­orders  --- all short.
                               One example arises when a de --- endant has built a new technology, ­process, or
                            business model that is inseparably based on misappropriated in --- ormation. In such
                            situations, courts may impose what is called a production injunction —­ not merely
                            barring  --- urther use o ---  a secret but also blocking the de --- endant  --- rom manu --- acturing
                            or selling any resulting products derived  --- rom it. ­These injunctions are designed
                            to prevent misappropriators  --- rom enjoying the  --- ruits o ---  their misconduct, even i ---

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 34 1/12/26 2:51 PM 1 • Understanding Trade Secret Law 35

                they have since made technical modi --- ications. I ---  the core advantage remains rooted
                in stolen knowledge, the court may treat any downstream product as tainted and
                o ---

-­limits.

                                      Injunction to Neutralize an Un --- air
                                                  Head Start

                                                        General Electric Co. v. Sung
                                                      843 F. Supp. 776 (D. Mass. 1994)
                     GE sued its  --- ormer employee, Dr. Chien-­Min Sung, who took proprietary
                     diamond-­     manu --- acturing documents and trans --- erred the technology to
                     Iljin Diamond Manu --- acturing. The court  --- ound that Iljin’s entire industrial
                     ­process  --- or saw-­grade diamonds was “substantially derived”  --- rom GE’s con-

idential documents. Recognizing that a s­imple use injunction would not su —


ice —­ ­because Iljin could not realistically “unlearn” the trade secrets —­ the court imposed a seven-­year production injunction. This barred Iljin — rom manu — acturing the product itsel — during the estimated time it would have taken to in­de­pen­dently develop the technology. The ruling rein — orced that when a secret is tightly woven into a product’s core, courts may go beyond use-­based restrictions and — reeze commercial activity altogether to neutralize the misappropriator’s advantage.

                   Other cases may call  --- or even broader structural or ­organizational remedies. For
                instance, courts have ordered internal audits, the appointment o ---  monitors, destruc-
                tion o ---  contaminated code, or even the trans --- er o ---  licensing rights back to the victim.
                ­These  --- orms o ---  relie ---  are typically tailored to ensure the de --- endant cannot continue
                 bene --- iting  --- rom any knowledge improperly gained, even i ---  it was only used in part.



                                             Mandating Code Destruction
                                             to Remedy Misappropriation

                          Syntel Sterling Best Shores Mauritius Limited v. The TriZetto Group, Inc.
                                                 68 F.4th 792 (2d Cir. 2023)
                     In this recent case, Syntel was  --- ound to have deliberately misappropriated
                     Trizetto’s con --- idential so --- tware architecture and code during the course o ---  a

ailed outsourcing relationship. The jury awarded damages, but the court went


urther. It ordered the destruction o — Syntel’s in — ringing code and enjoined

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 35 1/12/26 2:51 PM 36 1 • Understanding Trade Secret Law

                                 Syntel  --- rom using or disclosing any o ---  Trizetto’s trade secrets, including in
                                 derivative products or ­services. This remedy recognized that once trade secrets
                                 in --- ect a rival’s development ­process, the only way to restore  --- airness may be to
                                 purge all resulting outputs. By combining permanent injunction with manda-
                                 tory deletion o ---  source materials, the court signaled that equitable relie ---  can
                                 directly address the structural damage caused by trade secret the --- t.



                                ­These cases exempli --- y a broader truth: courts have wide discretion in cra --- ting
                            remedies that ensure  --- airness and restore competitive balance. When a de --- en-
                            dant’s entire operation or product line becomes tainted by stolen secrets, monetary
                            ­damages may be inadequate or di ---

icult to ­measure. Equitable tools —­ production bans, code destruction, licensing trans — ers, monitoring, and even dissolution o —

                             ­partnerships —­ o ---

er the — lexibility needed to unwind misuse and neutralize the mis- appropriator’s ill-gotten advantage. Additional equitable remedies also highlight how seriously courts take the duty o —

                            secrecy. ­These rulings rein --- orce that misuse o ---  con --- idential in --- ormation is not a mere
                            contract breach or commercial incon­ve­nience. It is a breach o ---  trust that can reshape
                            entire industries, and courts stand ready to issue sweeping and lasting ­orders to rebal-
                            ance the playing  --- ield.


                            1.5.6. The Importance o ---  Prompt Action
                                    and Thorough Evidence
                               A trade secret ­owner may possess strong l­egal rights, but en --- orcement depends
                            heavi­ly on timing and preparation. Courts do not automatically protect trade secrets.
                            They reward vigilance. Plainti ---

s who act quickly and substantiate their claims with detailed rec­ords are — ar more likely to secure strong remedies. By contrast, delay or disor­ga­ni­za­tion can render even the most valuable trade secrets unprotectable in practice. When a com­pany discovers pos­si­ble misappropriation, time is o — the essence. A trade secret that has not yet been used or disclosed may still be contained. But i — a plainti —


hesitates, the knowledge may spread, be embedded into a rival product, or even reach the public domain. At that point, the core requirement o — secrecy can be irreversibly lost. Courts recognize this danger, which is why they o — ten issue prelimi- nary injunctions when the plainti —


shows immediate and irreparable harm. But they ­will only act swi — tly i — the plainti —


does.

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 36 1/12/26 2:51 PM 1 • Understanding Trade Secret Law 37

                            Prompt Action Leads to Injunction Granted

                                                           IBM v. Papermaster
                                                     No. 08-­CV-9078 (S.D.N.Y. 2008)
                     IBM moved quickly to enjoin its  --- ormer executive, Mark Papermaster,  --- rom
                     joining Apple, arguing that the risk o ---  trade secret disclosure was imminent.
                     Although Papermaster had not yet revealed any con --- idential in --- ormation, IBM
                     convinced the court that his deep knowledge o ---  its micropro­cessor technol-
                     ogy —­ and the similarity o ---  his role at Apple —­ posed a serious threat. The court
                     granted a preliminary injunction, noting that IBM had acted promptly and
                     supported its claim with clear evidence o ---  both the con --- idential nature o ---  the
                     in --- ormation and the competitive risk. This case exempli --- ies how timeliness
                     strengthens a plainti ---

’s credibility and allows courts to intervene be — ore the damage is done.

                   Equally impor­tant is the ability to clearly de --- ine the trade secret and demonstrate
                the ­measures taken to protect it. Courts do not accept vague re --- erences to “proprietary
                knowledge” or “con --- idential methods.” They require speci --- icity —­ what the secret is,
                how it was secured, and how its disclosure or use caused harm. Plainti ---

s must show that the secret was treated as such: labeled con — idential, shared only ­under nondis- closure agreements, and protected through physical, digital, or procedural barriers. Injunctions and damages are not awarded based on moral indignation alone. They depend on the plainti —


’s own diligence. Courts ask: Did the com­pany take secrecy seriously be — ore the misappropriation occurred? Did it monitor access, en — orce poli- cies, and — ollow up on violations? ­These background — acts shape the court’s perception o — ­whether the trade secret was real and worth protecting.

                              Culture o ---  Secrecy Supports En --- orcement
                                       o ---  Trade Secret Rights

                                       Data General Corp. v. Digital Computer Controls, Inc.
                                                 357 A.2d 105 (Del. Ch. 1975)
                     Data General alleged that a competitor had acquired con --- idential engineering
                     drawings through  --- ormer employees. The court credited Data General’s con-
                     sistent en --- orcement o ---  con --- identiality practices: it marked documents as pro-
                     prietary, used employee agreements with nondisclosure clauses, and l­imited
                     internal access on a need-­to-­know basis. ­Because the com­pany demonstrated a

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 37 1/12/26 2:51 PM 38 1 • Understanding Trade Secret Law

                                 longstanding commitment to secrecy, the court  --- ound that the drawings quali-

ied as trade secrets. This case shows that courts look not only at the misappro- priation but also at the plainti —


’s prior be­hav­ior in sa — eguarding its in — ormation.

                               Taken together, t­hese decisions illustrate a ­simple but power­ --- ul lesson: a trade
                            secret is only as strong as the com­pany’s willingness to treat it as one. Courts ­will
                            intervene to protect secrecy, but only when plainti ---

s can prove (1) that they acted promptly upon discovering a threat and, (2) that they consistently treated the in — ormation as con — idential. The best way to prepare — or litigation is not ­a — ter a breach but well be — ore it, by building a rec­ord o — reasonable, diligent, and consistent secrecy practices.

                            1.5.7. Power­ --- ul and Nuanced Relie ---

                                Remedies represent the mechanism by which trade secret law de --- ends con --- identi-
                            ality. They balance the need  --- or prompt, o --- ten drastic ­measures —­ like halting produc-
                            tion lines or awarding signi --- icant damages —­ against the princi­ple that competition
                            should remain  --- ­ree  --- or i­ndependent or reverse-­engineering innovators. Hence, a
                            plainti ---

who proves wrong — ul acquisition, use, or disclosure can expect an array o —

                            tools: immediate injunctions, monetary relie ---  pegged to losses or ill-­gotten gains,
                            attorneys’  --- ees i ---  malice is evident, and possibly an ongoing royalty arrangement i ---

                            banning usage entirely seems inequitable.
                               ­These outcomes show that trade secret protection can be power­ --- ul  --- or a business
                            that invests in properly designating and securing its knowledge. Yet the law does not
                            automatically reward lax secrecy or block legitimate discovery methods. By under-
                            standing ­these remedial princi­ples, ­owners can gauge the practical bene --- its and limits
                            o ---  trade secrets as an intellectual property strategy, while potential de --- endants can
                            see how high the stakes are i ---  they encroach on proprietary data through unethical or
                            unauthorized methods.



                                              1.6. International Comparisons
                               The US approach to trade secrets, exempli --- ied by the UTSA and the  --- ederal DTSA,
                            has ­shaped modern discourse on protecting undisclosed commercial knowledge.
                            However, American courts and laws do not operate in a vacuum. As companies
                            increasingly  --- unction across borders, they must consider how other jurisdictions
                            de --- ine and en --- orce trade secrets. While many ­legal systems share core ideas —­ requiring

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 38 1/12/26 2:51 PM 1 • Understanding Trade Secret Law 39

                secrecy, economic value, and e ---

orts to protect it —­ they sometimes di —


er signi — icantly in scope, procedural mechanisms, or available remedies. This section examines the UTSA and the DTSA alongside international — rameworks: the Agreement on Trade-­ Related Aspects o — Intellectual Property Rights (TRIPS), the ­European ­Union’s Trade Secrets Directive, and prominent regimes in China, Canada, Mexico, and Israel. The TRIPS — ramework did not emerge in a vacuum. It grew out o — geopolitical pressure that was catalyzed by a coordinated campaign by the United States pharma- ceutical industry to globalize patent and data protections. That mobilization quickly shaped American trade policy. The United States used § 301 trade sanctions and Gen- eralized System o — Pre — erences conditionality to pressure Brazil, Thailand, India, and several Caribbean Basin states to accept intellectual property norms that they had resisted in WIPO — orums. For most o — the twentieth century, trade secret protection remained — ragmented. Brazil primarily addressed trade secrets through criminal un — air competition provi- sions, and comprehensive treatment arrived only with the Industrial Property Law o —

                1996. Within Europe, member states relied on inconsistent  --- rameworks that ranged

rom Dutch tort law to Maltese contract principles to limited or nonspeci — ic statu- tory coverage. Earlier international e —


orts, including the 1967 Stockholm revision o —

                the Paris Convention and the 1996 WIPO Model Provisions on Protection Against
                Un --- air Competition, o ---

ered so — t law guidance that urged states to curb acts contrary to honest practices but did not impose binding obligations. Building on the domestic Uni — orm Trade Secrets Act o — 1979, amended in 1985, the United States championed inclusion o — trade secret standards in the Uruguay Round negotiations. When the World Trade Organization’s Agreement on Trade Related Aspects o —

                Intellectual Property Rights entered into  --- orce in 1995, it became the  --- irst multilateral
                treaty to mandate explicit legal protection  --- or undisclosed in --- ormation under Article
                39. That provision incorporates by re --- erence Article 10bis o ---  the Paris Convention and
                its standard o ---  preventing un --- air commercial use. The ambiguity surrounding Article
                39.3, particularly whether it compels data exclusivity  --- or pharmaceutical test data, has
                been interpreted by most commentators and by state practice as not mandating exclu-
                sivity. WTO dispute settlement has largely  --- ocused on other provisions o ---  TRIPS,  --- or
                example the Canada–Patent Protection o ---  Pharmaceutical Products dispute on patent
                exceptions rather than data protection.
                   Article 39 established a contested global baseline  --- or trade secret protection. That
                baseline has been rein --- orced through TRIPS plus bilateral agreements and, in the
                United States, by the De --- end Trade Secrets Act o ---  2016, which  --- ederalized misap-
                propriation claims and con --- irmed substantial extraterritorial reach when an act in

urtherance occurs within the United States. For practitioners, the history shows that TRIPS set a — loor — or protecting undisclosed in — ormation and that the operative stan- dards continue to evolve through national legislation, trade agreements, and WTO interpretation.

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 39 1/12/26 2:51 PM 40 1 • Understanding Trade Secret Law

                            1.6.1. TRIPS: A Global Baseline  --- or
                                    Trade Secret Protections
                               The World Trade ­Organization (WTO) Agreement on TRIPS lays the  --- oundation

or how member countries treat undisclosed in — ormation. Article 39 o — TRIPS insists that member states must protect commercially valuable secrets against un — air competition, echoing the general premise o — American trade secret law. TRIPS di —


ers — rom the UTSA in that it is not a uni — orm model law but an international agreement. TRIPS does not prescribe a detailed procedural code; it sets minimum substantive standards — or protecting undisclosed in — ormation, requiring members to protect commercially valuable in — ormation kept secret through reason- able measures against disclosure, acquisition, or use contrary to honest commercial practices. It calls — or preventing in — ormation — rom being disclosed, acquired, or used by third parties “in a manner contrary to honest commercial practices,” especially when that data is valuable and subject to reasonable steps to remain con — idential. This high-­level alignment with the UTSA and the DTSA underscores the broad global consensus on punishing industrial espionage, deception, or breaches o — trust. Still, each WTO member retains — lexibility in how it translates TRIPS obligations into domestic statutes. En — orcement provisions, damage calculations, and injunctive relie — vary widely. Some countries accord trade secret disputes specialized treatment in specialized courts, while ­others ­handle them ­under more general civil or commercial codes. As long as they uphold the basic TRIPS princi­ples o — protecting undisclosed knowledge, states satis — y their treaty obligations. The result is a baseline that resembles American doctrine, even though the details can diverge. A — irm that experiences misappropriation abroad cannot directly invoke TRIPS against a — oreign actor. Instead, en — orcement o — TRIPS obligations occurs through the WTO’s Dispute Settlement Body and must be initiated by a member state, not a private party. As a result, companies o — ten depend on their home govern- ments to press trade secret concerns through diplomatic or trade channels rather than direct ­legal action. In practice, this means that the e —


ectiveness o — TRIPS o — ten turns on local procedural norms, national implementation, and the ­political ­will to en — orce. Nonetheless, TRIPS serves as a crucial benchmark: it establishes minimum stan- dards and re — lects international consensus that unethical methods o — extracting undis- closed commercial in — ormation (o — ten re — erred to as con — idential know-how) should be penalized. In many cases, stronger protections arise through “TRIPS-­plus” provisions negotiated in bilateral or regional trade agreements, which go beyond the baseline obli- gations o — TRIPS. The United States, in par­tic­ul­ar, has used trade leverage —­ includ- ing § 301 investigations and bilateral agreements —­ to encourage stricter en — orcement o — trade secret norms. At the same time, the Doha Declaration, which clari — ied that TRIPSdoes not and should not prevent members — rom taking measures to protect pub- lic health, and related debates highlight ongoing tensions between intellectual property en — orcement and access to knowledge, particularly in — ields like health and technology.

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 40 1/12/26 2:51 PM 1 • Understanding Trade Secret Law 41

                1.6.2. The ­EU Trade Secrets Directive
                   Historically, EU member states had varied approaches to trade secret en --- orcement.
                Some, such as Germany, possessed robust protections, while ­others relied on less-­
                de --- ined un --- air competition princi­ples. In 2016, the EU approved the Trade Secrets
                Directive (Directive 2016/943) to harmonize ­these di ---

erences and ensure consistent standards. The Directive de — ines a trade secret similarly to the UTSA and the DTSA,


ocusing on secrecy, commercial value, and reasonable ­measures — or protection. It also lists speci — ic acts o — unlaw — ul acquisition, use, or disclosure, mirroring the “mis- appropriation” language — ound in American statutes. The EU Directive instructs member states to ensure that courts can grant injunc- tions, damage awards, and ­orders to preserve con — identiality during litigation. By emphasizing that ­owners must prove ­actual or potential economic value — rom secrecy, the Directive aligns closely with American doctrines. Yet procedural aspects still vary


rom one member state to another. The Directive sets minimum requirements, but the ­actual en — orcement environment can re — lect local judicial practices. In certain EU countries, the courts might provide swi — ter preliminary injunctions, while in ­others, the threshold — or proving irreparable harm may be higher or the ­measure o — damages more conservative. Another distinctive — ­actor is that EU law generally upholds employee mobility and requires balancing the interests o — workers and employers. Courts aim to protect trade secrets while allowing workers to change jobs — reely. They also work to prevent employees — rom acting disloyally or misusing con — idential in — ormation. This balance is impor­tant ­because it sa — eguards business interests while respecting employee rights to ­career mobility. Like the DTSA, the EU — ramework invalidates nondisclosure obligations i — the knowledge has become generally known or can be deduced through — air means. How- ever, divergences in civil procedure, evidentiary rules, and local cultural attitudes about competition can subtly shape outcomes. For international businesses operat- ing in multiple EU jurisdictions, it remains vital to monitor local court trends and national statutes that implement the Directive in nuanced ways.

                1.6.3. China: Evolving En --- orcement ­Under
                       Anti-­Un --- air Competition Law
                   China’s stance ­toward trade secret law has evolved dramatically. It was once per-
                ceived as a high-­risk environment  --- or  --- oreign companies, given the country’s lax
                en --- orcement and the di ---

iculties in gathering evidence o — misappropriation. But amendments to the Anti-­Un — air Competition Law and complementary regulations over the past ­decade have strengthened l­egal recourse — or trade secret ­owners. Chi- nese courts are now more willing to grant civil or even criminal remedies, especially


or large-­scale the — t or conspiratorial be­hav­ior.

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 41 1/12/26 2:51 PM 42 1 • Understanding Trade Secret Law

                               ­These re --- orms align Chinese doctrine more closely with UTSA and DTSA princi­
                            ples. Chinese law requires that the in --- ormation be unknown to the public, con --- er
                            commercial value ­because o ---  that secrecy, and be guarded by appropriate ­measures.
                            Employees, contractors, and business partners bear a duty to uphold con --- identiality
                            obligations. I ---  they commit  --- raud, the --- t, or inducement to obtain the secret, courts can
                            issue injunctions and award damages.
                               En --- orcement challenges persist in areas such as evidence gathering. Plainti ---

s may strug­gle to prove misappropriation without robust discovery procedures. Still, recent cases demonstrate that high-­pro — ile disputes —­ particularly t­hose involving sensi- tive technology or major — oreign investment —­ can result in signi — icant judgments or criminal charges. Foreign — irms o — ten buttress their trade secret posture in China by combining strict internal controls with local partnerships that mitigate risk. They also sometimes keep key aspects o — secret pro­cesses outside the country. Such strategies do not guarantee immunity — rom the — t, but they re — lect an awareness that Chinese law, while improved, may not always respond in the same manner as American courts. Yet as China’s commercial ambitions continue to grow, trade secret en — orcement remains a crucial and intensi — ying — ield o — ­legal re — orm.

                            1.6.4. Canada: Blend o ---  Statutory and
                                    Common Law Princi­ples
                                Canada’s provincial l­egal  --- rameworks generally parallel the American approach.
                            Although ­there is no single nationwide statute mirroring the UTSA, Canadian courts
                            rely on common law rules against breaches o ---  con --- idence, plus vari­ous provincial leg-
                            islation targeting un --- air competition. A plainti ---

must show that the in — ormation was secret, valuable because o — secrecy, and shared in an environment implying con — iden- tiality. Wrong — ul acquisition or disclosure ­will then give rise to potential injunctions and monetary remedies. Canadian courts o — ten cite ­English case law in addition to looking to American pre­ce­dent. They share the general princi­ples that legitimate reverse engineering is permissible and that employee mobility should not be unreasonably constrained. Some provinces have rules reminiscent o — the UTSA in style, i — not in codi — ied detail. Damages can be calculated through lost pro — its or unjust enrichment, but large punitive awards are less common than in the United States. Canada also rec- ognizes that some nondisclosure obligations can overlap with non-competition or non-­solicitation clauses, and ­those must not exceed the reasonable scope needed to protect genuine secrets. ­Because Canada is a party to the USMCA ( — ormerly NAFTA), cross-­border — irms dealing with trade secrets may — ind streamlined en — orcement ­under certain circum- stances. They remain mind — ul, however, that provincial di —


erences exist, especially in Quebec’s civil law system, which takes guidance — rom French ­legal traditions. Gener- ally, i — a com­pany care — ully demonstrates secrecy and invests in appropriate protective

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 42 1/12/26 2:51 PM 1 • Understanding Trade Secret Law 43

                ­measures, Canadian courts can be counted on to uphold the essence o ---  the UTSA/
                 DTSA approach.


                1.6.5. Mexico: Recent Re --- orms and Distinct
                       Procedural Hurdles
                    Mexico’s Federal Law  --- or the Protection o ---  Industrial Property, which replaced
                ­earlier legislation, governs trade secrets alongside patents, trademarks, and other
                 IP rights. The law de --- ines a trade secret as in --- ormation kept con --- idential by reason-
                 able means, possessing real or potential economic value, and not generally known.
                 In that sense, it overlaps signi --- icantly with UTSA/DTSA standards. Unauthorized
                 acquisition through deceit, breach o ---  contract, or other disloyal acts is considered an
                 in --- ringement, and the law provides  --- or injunctions and damages.
                    Despite this similarity on paper, en --- orcement in Mexico can involve unique pro-
                 cedural challenges. Civil litigation may pro­gress slowly, and collecting evidence o ---

                 misappropriation is not always straight --- orward. Some cases also can shi --- t into crimi-
                 nal domains i ---  the the --- t is grave, but that route entails higher burdens o ---  proo --- . Trade
                 secrets intersect with Mexico’s broader competition policies, meaning that certain
                 NDAs must not be dra --- ted so broadly that they become anticompetitive or in --- ringe
                ­labor rights.
                   Many international companies that enter Mexico adopt parallel ­measures: they
                create robust internal compliance (requiring NDAs and limiting disclosure), keep
                certain key pro­cesses abroad, and closely monitor potential local partners or sub-
                contractors. Although Mexico’s statutory language mirrors that o ---  more mature sys-
                tems, the real­ity can vary  --- rom region to region. Nevertheless, Mexico’s e ---

orts to modernize its IP and trade secret laws ­under the USMCA — ramework continue to reduce discrepancies with US practice, o —


ering more reliable protection — or — oreign and domestic businesses alike.

                1.6.6. Israel: Balancing Innovation with
                       Con --- identiality Obligations
                   Israel’s trade secret regime draws largely  --- rom the Commercial Torts Law o ---  1999,
                buttressed by case law that resembles common law un --- air competition doctrines. The
                statutory  --- ramework bars the use or disclosure o ---  a trade secret without the ­owner’s
                consent i ---  it was obtained in bad  --- aith, through breach o ---  con --- idence, or by other
                unethical means. Israeli courts also embrace the notion that genuine secrecy must
                exist and must be guarded actively by the ­owner. I ---  a secret becomes publicly available,
                or i ---  a competitor discovers it in­de­pen­dently, protection dissolves.
                  In addition, Israeli courts can impose injunctions and grant damages. They
                emphasize the signi --- icance o ---  employee mobility and the public interest in  --- ostering

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 43 1/12/26 2:51 PM 44 1 • Understanding Trade Secret Law

                            entrepreneurship, so they tend to con --- irm that only “truly secret” pro­cesses deserve
                            sweeping NDAs or post-­employment restrictive covenants. This stance aligns with
                            that o ---  many EU countries, where an employer’s interest in secrecy must be balanced
                            against a pro --- essional’s  --- reedom to use their general skills.
                                En --- orcement in Israel can be quite proactive  --- or technology-­based businesses, given
                            the country’s status as a leading tech innovator. ­Organizations that demonstrate thor-
                            ough internal controls and make immediate responses to suspected leaks typically  --- ind
                            the courts to be supportive. On the other hand, i ---  a  --- irm attempts to rely on trade secret
                            rhe­toric without consistent security ­measures or it tries to sti --- le normal employee tran-
                            sitions, the judicial response ­will be ­measured. Overall, Israel’s system incorporates
                            core UTSA/DTSA ele­ments —­ secrecy, value, and wrongdoing —­ while sustaining a
                            policy backdrop that encourages open innovation ­under controlled conditions.


                            1.6.7. Convergence and Divergence in
                                    Global Trade Secret Regimes
                               International l­egal regimes have largely converged on the substantive de --- initions
                            o ---  a “trade secret” and its “misappropriation.” But rights and responsibilities that  --- low

rom that de — inition diverge signi — icantly. The UTSA (promulgated in 1979 and amended in 1985), the DTSA (enacted May 11, 2016), the World Trade ­Organization’s Agreement on Trade-­Related Aspects on Intellectual Property (entered on Jan. 1, 1995), the EU Trade Secrets Directive (­adopted on June 8, 2016), China’s anti-­un — air competition law re — orms (2018/19), Israel’s Commercial Torts Law (1999), the Canada–­United States–­Mexico Agreement Implementation Act (entered on July 1, 2020), and Mexico’s Federal Law — or the Pro- tection o — Industrial Property (entered on Nov. 5, 2020) have all nudged global prac- tices ­toward broadly similar criteria: A trade secret is in — ormation that remains con — idential, holds commercial value speci — ically ­because o — that secrecy, and is actively protected by its ­owner. Acquiring or using the knowledge through deception or breach o — con — idence triggers liability. Nevertheless, impor­tant di —


erences persist in procedural rules, discovery pow- ers, and cultural attitudes t­oward competition. While American courts can award expansive damages or punitive relie — , some other systems limit recoveries or treat litigation as less adversarial. In certain jurisdictions, it may be harder to secure a swi — t injunction or to gather the evidence needed to prove misappropriation. Where US law might promptly issue a preliminary injunction to maintain the status quo,


oreign courts may require a more stringent standard o — proo — or a detailed showing o — irreparable harm. Another area o — divergence arises in how vigorously courts uphold employee mobility. In the United States, many states dis — avor overly broad noncompetition clauses but do en — orce reasonable NDAs. The EU, Canada, Israel, and other juris- dictions similarly re­spect employees’ — reedom to move between jobs, yet they o — ten

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 44 1/12/26 2:51 PM 1 • Understanding Trade Secret Law 45

                scrutinize con --- identiality agreements to ensure they do not hamper legitimate tran-
                sitions. China’s approach remains  --- luid, balancing a growing recognition o ---  trade
                secret rights against the real­ity o ---  robust local competition. The bottom line is that
                while the UTSA and the DTSA are not global law, their emphasis on secrecy, value,
                and wrongdoing  --- orms an international template that local lawmakers have bor-
                rowed and adapted.
                   Ultimately, companies with multinational  --- ootprints must harmonize their secrecy
                strategies. They must implement consistent internal controls,  --- rom NDAs to seg-
                mented access to sensitive data, to ensure compliance with both American  --- rame-
                works and  --- oreign statutes. By treating secrecy as a global discipline —­ limiting who
                sees the in --- ormation, training employees in multiple jurisdictions, and quickly en --- orc-
                ing rights when leaks emerge —­ ­owners maximize their odds o ---  securing remedies in
                varied ­legal arenas. Understanding the parallels and distinctions among trade secret
                regimes around the world enables businesses to navigate cross-­border challenges and
                remain vigilant against misappropriation, ­whether in a US district court action ­under
                the DTSA or a specialized proceeding in a  --- ar-­ --- lung jurisdiction.



                                      1.7 Frictions and Trade-­O ---

s Trade secret law is not only about locking up knowledge; it is about steering inno- vation, ­labor, and competition. Courts judge “reasonable e —


orts,” but what counts as reasonable re — lects deeper policy choices about what to protect, how strongly, and against whom. As you move ­toward building your own Trade Secret Protection Plan (TSPP), keep an eye on — our recurring tensions that shape both l­egal outcomes and business practices.

                1.7.1. Secrecy vs. Mobility
                   Employers o --- ten seek to stop departing engineers  --- rom carry­ing know-­how (which
                can be even more general than what trade secret law de --- ines as protectable in --- or-
                mation) to rivals. Some use NDAs, noncompetes, or “inevitable disclosure” claims
                to limit risk. But states like Cali --- ornia treat post-­employment mobility as a public
                good and prohibit most noncompetes on policy grounds. Courts in mobility-­ --- riendly
                jurisdictions ­will scrutinize overbroad restrictions and may deny injunctive relie ---  that
                looks like a restraint on ordinary ­career moves.


                1.7.2. Con --- identiality vs. Competition
                   NDAs are essential —­ but when dra --- ted too broadly, they can suppress ordinary
                commercial competition. For example, a vendor asked to sign an NDA may worry
                that it prevents ­ --- uture work with other customers. Recent empirical studies suggest

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 45 1/12/26 2:51 PM 46 1 • Understanding Trade Secret Law

                            that many NDAs now  --- unction as de  --- acto noncompetes, thus triggering scrutiny
                            ­under antitrust law and FTC policy. En --- orcement hinges not only on content but also
                             on context and proportionality.


                            1.7.3. Security vs. Transparency
                               Some trade secret claims intersect with employee obligations to report miscon-
                            duct, raise product-­sa --- ety concerns, or alert regulators. While secrecy is critical to
                            commercial integrity, it must sometimes yield to whistle-­blower protections and
                            public-­interest disclosures. Courts and legislatures increasingly carve out exceptions

or “good — aith” disclosure, especially where health, sa — ety, or illegality is at stake.

                            1.7.4. Protection vs. Innovation
                               Firms must o --- ten choose between the secrecy o ---  trade secret law and the disclo-
                            sure required  --- or patent protection. This decision re --- lects a broader policy trade-­o ---

                            between static control (holding onto exclusive rights) and dynamic spillovers (allow-
                            ing ­others to build and improve). Patent law o ---

ers time-­limited monopolies with — ull disclosure; trade secrets o —


er longer potential duration, but only i — secrecy is main- tained and law — ul reverse engineering is unlikely.

                            1.7.5. Trade Secret Protections in the Balance
                               A sound TSPP guards what ­matters —­ but also aligns with the ­organization’s values,
                            competitive goals, and obligations to employees and society. As you begin Chapter 2,
                            you ­will start the ­process o ---  identi --- ying, classi --- ying, and protecting your con --- idential
                            assets. That ­process is not just ­legal. It is strategic.



                                                   1.8. From ­Legal De --- initions
                                                      to Practical Protection
                                Trade secrets occupy a unique position within intellectual property law. Unlike
                            patents or trademarks, they are not created by  --- iling paperwork or satis --- ying a  --- ormal
                            statutory test. They exist only so long as they are actively and e ---

ectively kept secret. This — eature makes trade secret law both power­ — ul and — ragile. It protects some o — the most valuable assets in business —­  — ormulas, pro­cesses, strategies, and data —­ but only i — the ­owner treats them like secrets worth guarding. As this chapter has shown, a trade secret must meet three core criteria: it must be in — ormation, it must derive i­ndependent economic value — rom not being generally known or readily ascertainable, and it must be subject to reasonable e —


orts to main-

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 46 1/12/26 2:51 PM 1 • Understanding Trade Secret Law 47

                tain secrecy. ­Those requirements de --- ine what quali --- ies as a trade secret, but they also
                set the  --- oundation  --- or every­thing that  --- ollows. A business that does not know what its
                secrets are, cannot articulate why they ­matter, or has not built a culture o ---  con --- iden-
                tiality ­will strug­gle to en --- orce its rights.
                    We have also seen that trade secret law is not passive. Remedies —­ ­whether dam-
                 ages, injunctions, or equitable relie ---  —­ are not automatic. They require evidence,
                 speed, and credibility. Courts respond to clear documentation, consistent en --- orce-
                 ment, and timely ­legal action. Without ­those ­things, even egregious misappropriation
                may go unpunished. In this regard, trade secret protection is not merely a ­matter o ---

                ­legal theory but rather a ­matter o ---  ­organizational discipline.
                   This book is built on that idea. The chapters that  --- ollow do not assume that trade
                secrets can be protected with a single policy or contract. Instead, they explore what
                real protection requires: identi --- ying your trade secrets with precision, assessing their
                value and risk, establishing layers o ---  internal and external sa --- eguards, and responding
                e ---

ectively to breaches when they occur. The law provides tools —­ but it is up to busi- nesses, ­lawyers, and courts to use them wisely. In short, trade secret protection is not something that happens in courtrooms. It happens in con — erence rooms, product labs, and shared servers. It is embedded in who has access to what, how in — ormation — lows within an ­organization, and how leaders set expectations — or con — identiality. What the law recognizes as a trade secret depends entirely on what the business chooses to protect and how well it does so. The rest o — this book ­will show you how to do exactly that.

                                                           Re --- erences
                  Mark A. Lemley, The Surprising Virtues o ---  Treating Trade Secrets as IP Rights, 61
                Stan. L. Rev. 311 (2010).
                    Orly Lobel, Talent Wants to Be ­Free (Yale University Press 2013).
                    Amy Kapczynski, The Public History o ---  Secrets, 55 U.C. Davis L. Rev. 1367 (2022).
                  William Landes & Richard Posner, The Economic Structure o ---  Intellectual
                Property Law (Belknap Press 2003).
                  I.P.L. Png, Secrecy and Patents: Theory and Evidence  --- rom the UTSA, 2(3) Strategy
                Science 176–­93 (2017).
                  Camilla Hrdy & Christopher Seaman, Beyond Trade Secrecy: Con --- identiality Agree-
                ments That Act Like Noncompetes, 133 Yale L.J. 669 (2024).
                   David S. Levine, Secrecy and Unaccountability: Trade Secrets in Our Public In --- ra-
                structure, 59 Fla. L. Rev. 135 (2007).
                  Ronald Gilson, The ­Legal In --- rastructure o ---  High Technology Industrial Districts, 74
                N.Y.U. L. Rev. 575 (1999).

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 47 1/12/26 2:51 PM 6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 48 1/12/26 2:51 PM Chapter 2 Inventorying and Classi — ying Trade Secrets

                   You cannot hit a target you cannot perceive —­ and you cannot protect a trade secret
                o ---  which you are unaware.
                   Trade secret protection begins with one unshakable truth: you must know what
                you are protecting. ­There is no such ­thing as a secret that protects itsel --- . The law only
                helps ­those who help themselves —­ and the  --- irst step is identi --- ying which pieces o ---

                in --- ormation quali --- y as trade secrets in the  --- irst place.
                   This chapter marks the beginning o ---  that ­process. Be --- ore a com­pany can reduce
                risk, impose restrictions, or take ­legal action, it must  --- irst recognize the assets at stake.
                That means conducting a thorough inventory o ---  its con --- idential knowledge —­ identi-

ying what secrets exist, where they reside, how they — unction, and why they ­matter. Inventorying is not about documentation — or its own sake. It is about clarity. A well-­executed trade secret inventory allows a business to prioritize what ­matters most, classi — y di — ­ — er­ent kinds o — secrets, and build a protection strategy tailored to its unique operations. Without it, even the best ­legal theories or policies ­will — ail. ­Every other chapter in this book depends on this one. Although you now under- stand what trade secrets are and how they — it into the — ramework o — intellectual prop- erty (Chapter 1), you cannot evaluate risks (Chapter 3), mitigate threats (Chapters 4 and 5), en — orce your rights (Chapter 6), or implement an organization-­wide plan (Chapter 7) ­unless you have — irst inventoried and classi — ied your trade secrets (this Chapter 2). This step is not optional. It is the — oundation — or every­thing that — ollows.

                            2.1. Identi --- ication Is the Foundation

or Protection Trade secrets are protected only when they are identi — ied, valued, and actively guarded. Unlike patents or copyrights, trade secrets are not registered or granted by the government. They have no — ixed term and no o —


icial recognition. They exist only ­because someone treats them as secrets —­ and i — someone stops treating them that way, they dis­appear.

                                                             49

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 49 1/12/26 2:51 PM 50 2 • Inventorying and Classi — ying Trade Secrets

                               The  --- irst step in protecting a trade secret is knowing that it exists. That’s the purpose
                            o ---  a trade secret inventory. It gives a business a structured way to identi --- y and classi --- y
                            the con --- idential in --- ormation that drives its competitive edge. Without an inventory,
                            protection is impossible. You cannot en --- orce a right to something you never docu-
                            mented. You cannot prioritize sa --- eguards  --- or assets you have never named.
                               This chapter walks through how to create that inventory. It explains how to rec-
                            ognize di --- ­ --- er­ent kinds o ---  trade secrets, how to apply the ­legal test  --- or protection, and
                            how to assign priority levels based on economic importance. Along the way, it o ---

ers practical tools — or making the inventory a living part o — your business: not a static list, but an ongoing ­process. Trade secret protection is a system, not a — iling cabinet. That system starts ­here.

                                                 2.2. Identi --- ying Trade Secrets

or the Inventory You cannot protect a trade secret ­until you recognize that you have one. That ­simple insight underlies the most impor­tant task in building a Trade Secret Protection Plan: identi — ying what quali — ies as a trade secret in the — irst place. Most businesses are sur- prised by how much in — ormation quali — ies —­ and by how much does not. This section explains how to recognize a trade secret when you see one. It dis- tinguishes between three major categories o — secrets —­ technical, business, and hybrid —­ and shows how each can quali — y — or l­egal protection. ­These categories do not create l­egal rights on their own. But they help teams inventory their secrets more clearly, making it easier to apply the l­egal test — rom Chapter 1 and assess risk in Chapter 3. E —


ective identi — ication is not about reciting doctrine. It is about learning to look at your own operations —­ products, pro­cesses, strategies, and data —­ and recognizing which parts give you an edge. Many o — ­those edges exist only ­because ­others do not know how you do what you do. Once you see your business through that lens, you can begin identi — ying what needs protection.

                            2.2.1. Technical Trade Secrets
                               Technical trade secrets are o --- ten the easiest to recognize. They include product

ormulas, manu — acturing pro­cesses, engineering designs, source code, algorithms, and scienti — ic methods. I — the in — ormation is used to build, create, test, or operate a product or ­service and is not generally known, it may be a technical trade secret.

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 50 1/12/26 2:51 PM 2 • Inventorying and Classi — ying Trade Secrets 51

                   ­These secrets usually reside with engineers, developers, or scientists —­ but not
                always. A sales team’s proprietary scoring model or an IT department’s internal
                cybersecurity architecture might also quali --- y. What ­matters is that the knowledge is
                technical in nature and used to accomplish a speci --- ic  --- unctional task.
                    To quali --- y as a trade secret, a technical ­process must be su ---

iciently detailed to be replicated. Courts do not protect vague ideas like “make the so — tware run — aster” or “improve product quality.” The ­process must be de — ined with enough speci — icity that, i — stolen, it could be used by a competitor to replicate the bene — it.

                             So --- tware Algorithms Can Be Trade Secrets

                                               ClearOne Communications, Inc. v. Bowers
                                                    643 F.3d 735 (10th Cir. 2011)
                     ClearOne developed proprietary echo cancellation so --- tware  --- or use in its audio
                     con --- erencing systems. When a competitor acquired the so --- tware through a
                     third party and integrated it into its own products, ClearOne sued  --- or misap-
                     propriation. The court upheld an injunction,  --- inding that ClearOne’s under­
                     lying algorithms ­were protectable technical trade secrets. This case rein --- orces
                     that advanced so --- tware logic, even i ---  not patented, can receive trade secret pro-
                     tection i ---  kept con --- idential and technically detailed.




                2.2.2. Business Trade Secrets
                   Business trade secrets are equally impor­tant, though sometimes less obvious. They
                include customer lists, pricing strategies, supplier terms, marketing tactics, sales

orecasts, and operational methods. Unlike technical secrets, business secrets are not about how to build a product —­ they are about how to sell it, manage it, or gain a market advantage. Business secrets o — ten live in spreadsheets, databases, and employee knowledge. They are especially vulnerable when employees leave to join a competitor or start a new business. A well-­maintained customer relationship management (CRM) sys- tem, i — protected by con — identiality agreements and ­limited access, can be one o — the most valuable trade secrets a com­pany owns. The key question is ­whether the in — ormation is more than general business expe- rience. Courts distinguish between an employee’s general knowledge (which is portable) and the employer’s con — idential methods (which are protectable). I — the in — ormation gives the business a competitive edge and is not available to ­others with- out e —


ort, it may quali — y as a trade secret.

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 51 1/12/26 2:51 PM 52 2 • Inventorying and Classi — ying Trade Secrets

                                            Customer Lists and Pricing In --- ormation
                                                    Can Be Trade Secrets

                                                       Che --- s Diet Acquisition Corp. v. Lean Che --- s, LLC
                                                       2016 U.S. Dist. LEXIS 133299 (S.D.N.Y. 2016)
                                 Former executives o ---  Che --- s Diet launched a competing com­pany, using cus-
                                 tomer lists, proprietary ­recipes, and pricing data taken  --- rom their previous
                                 employer. The court allowed trade secret claims to proceed,  --- inding that such
                                 business-­side data —­ when actively protected —­ could quali --- y  --- or l­egal protec-
                                 tion. This case shows that customer and pricing in --- ormation is not just admin-
                                 istrative detail; it can be a core asset i ---  treated as a secret.




                            2.2.3. Hybrid Trade Secrets
                               Some trade secrets blur the line between technical and business. ­These hybrid
                            secrets combine engineering or scienti --- ic content with strategic,  --- inancial, or opera-
                            tional components. For example, a so --- tware tool that calculates optimal pricing based
                            on real-­time data inputs involves both technical algorithms and business decision-­
                            making. Neither part alone may be groundbreaking, but together they can produce a
                            high-­value system.
                               Hybrid trade secrets are increasingly common in data-­driven businesses. A predic-
                            tive analytics plat --- orm might use con --- idential client data and a proprietary algorithm.
                            A marketing campaign might rely on a custom-­built segmentation model and an
                            internal dataset. ­These are not purely technical or purely strategic —­ they are both.
                               What makes hybrid trade secrets power­ --- ul is the way they integrate multiple types
                            o ---  knowledge into a cohesive advantage. Courts have recognized this  --- usion as pro-
                            tectable when the individual components are con --- idential and the combined system
                            delivers unique value.



                                             Hybrid Business-­Technical In --- ormation
                                                      Can Be Trade Secrets

                                                               ClearOne Advantage, LLC v. Kersen
                                                           2024 U.S. Dist. LEXIS 205636 (D. Md. 2024)
                                 ClearOne sued a  --- ormer employee who allegedly stole client-­targeting algo-
                                 rithms used to optimize digital marketing campaigns. The algorithms combined
                                 technical logic with behavioral and  --- inancial data, making them valuable  --- or

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 52 1/12/26 2:51 PM 2 • Inventorying and Classi — ying Trade Secrets 53

                     both engineering and strategic purposes. The court  --- ound that the combination
                     o ---  technical components and marketing use could constitute a trade secret. This
                     case illustrates how hybrid in --- ormation can be protectable when it integrates
                     con --- idential data and technical methods into a single, high-­impact system.




                                             2.3. Applying the Three
                                               Essential Ele­ments
                   Be --- ore a business can protect its in --- ormation as a trade secret, it must  --- irst deter-
                mine ­whether that in --- ormation meets the l­egal de --- inition. Trade secret protection
                is not automatic; it applies only when the in --- ormation satis --- ies all parts o ---  a three-­
                element test:
                       1. The in --- ormation must quali --- y as a protectable  --- orm o ---  knowledge
                          (re --- erred to ­here simply as “in --- ormation”);
                       2. It must have ­independent economic value ­because it is kept secret; and
                       3. The ­owner must take reasonable e ---

orts to maintain that secrecy. Each ele­ment plays a distinct and necessary role. I — even one is missing, the in — or- mation cannot be treated as a trade secret ­under state or — ederal law. Courts look to all three when deciding ­whether something is legally protected. The — irst and third ele­ments —­ what counts as “in — ormation,” and what counts as “reasonable e —


orts” —­ are relatively straight — orward in structure, though they raise impor­tant questions in practice. The second ele­ment, however, is more complex. The second ele­ment requires that the in — ormation’s economic value comes — rom the — act that it is not widely known or easily discovered. Courts have consistently held that this ele­ment is not a single — act to prove but rather a combination o — interrelated conditions that work together to establish value through secrecy. Speci — ically, to meet this ele­ment, the in — ormation must (a) have ­independent economic value (that is, its value comes speci — ically — rom being secret), (b) not be generally known in the relevant industry, and (c) not be readily ascertainable through proper means. ­These three qualities are not separate l­egal ele­ments. Rather, they — orm a single, compound ele­ment: ­independent economic value — rom secrecy. In some cases, courts analyze them together as one inquiry; in ­others, especially where — acts are contested, they break them apart. For clarity, this guide takes the latter approach. Understanding how this second ele­ment works is key to identi — ying what in — ormation quali — ies — or trade secret protection and what does not.

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 53 1/12/26 2:51 PM 54 2 • Inventorying and Classi — ying Trade Secrets

                            2.3.1. In --- ormation
                               The  --- irst ele­ment o ---  the trade secret test requires that the subject ­matter quali --- y as
                            “in --- ormation.” At a glance, this might seem obvious, but trade secret law draws a care-

ul line between in — ormation that is protectable and in — ormation that is not. The UTSA de — ines a trade secret as “in — ormation, including a — ormula, pattern, compilation, program, device, method, technique, or ­process.” This list is not exhaus- tive, but it illustrates the breadth o — what can be protected —­ so long as the other two ele­ments o — the trade secret test are met. In practice, courts have recognized a wide range o — content as “in — ormation,” including: • Formulas (e.g., chemical ­recipes, — lavor blends) • Patterns (e.g., textile templates, engineering layouts) • Compilations (e.g., curated customer lists, pricing databases) • Programs (e.g., so — tware source code or apps) • Methods and Techniques (e.g., specialized manu — acturing steps or analytical procedures) • Pro­cesses (e.g., production sequences or business work — lows) • Design Speci — ications (e.g., CAD — iles, engineering blueprints) • Prototypes (e.g., mockups embodying novel design — eatures) • Strategic Plans (e.g., product roadmaps or market-­entry strategies) • Algorithms and Codes (e.g., data-­sorting logic or encryption keys) • Procedures (e.g., internal quality control protocols or training protocols)

                               What unites all o ---  ­these in --- ormation types is that they represent concrete, de --- ined
                            sets o ---  knowledge or instructions that are capable o ---  being protected —­ provided they
                            are also secret and valuable.
                                 However, not every­thing a com­pany keeps private is protectable. The law excludes:
                                    • Physical objects themselves (though the design or method ­behind them may
                                       be protectable)
                                    • General employee skill and experience
                                    • Sensory impressions (e.g., the taste o ---  a product, ­unless tied to a secret  --- ormula)
                                    • Abstract ideas or undeveloped concepts

                               In other words, trade secret law protects knowledge, not t­hings. A machine is
                            not a trade secret, but the con --- idential ­process  --- or building or operating it might be.
                            Similarly, a person’s accumulated skill is not a com­pany trade secret —­ even i ---  they
                            acquired that skill on the job —­ ­unless they are also taking de --- ined, protectable knowl-
                            edge along with them.

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 54 1/12/26 2:51 PM 2 • Inventorying and Classi — ying Trade Secrets 55

                               Technical Concepts Can Be Trade Secrets

                                     Altavion, Inc. v. Konica Minolta Systems Laboratory, Inc.
                                                    226 Cal. App. 4th 26 (2014)
                     Altavion developed a method  --- or embedding secure digital stamps into PDF

iles and shared this idea with Konica Minolta ­under a con — identiality agree- ment. When Konica Minolta applied — or patents on similar technology without involving Altavion, litigation — ollowed. The court held that Altavion’s ideas ­were su —


iciently speci — ic and technically detailed to quali — y as trade secrets. Although they had not yet been turned into a product, they ­were well-­developed enough to be protectable. This case illustrates that even early-­stage concepts can be trade secrets i — they are clearly described and technically meaning — ul.

                    Fi­nally, courts  --- ocus on the substance, not the  --- orm. It does not ­matter ­whether the
                in --- ormation is written on paper, stored in a  --- ile, or embedded in a prototype. What
                ­matters is ­whether the under­lying knowledge is su ---

iciently concrete, secret, and eco­ nom­ically valuable to warrant protection. Trade secret law protects the intangible insight, not the medium it happens to live in.

                2.3.2. Independent Economic Value

rom Secrecy The second ele­ment o — the trade secret test requires that the in — ormation provide a competitive advantage ­because it is kept secret. Trade secret law does not protect secrecy — or its own sake —­ it protects secrecy that has commercial signi — icance. In other words, the in — ormation must be valuable in a way that depends on its not being gener- ally known or easily discoverable. That value must be tied directly to its con — identiality. For example, a secret — ormula that allows a com­pany to produce goods more cheaply, a pricing model that gives it leverage in negotiations, or a customer list that allows more targeted sales —­ all o — ­these might have economic value that comes — rom being closely held. I — the same in — ormation ­were to become widely known, the advan- tage would dis­appear. This second ele­ment is more complex than it — irst appears. Courts have consis- tently interpreted it as a compound requirement, one that involves several interlock- ing ideas: A. The in — ormation must have ­independent economic value —­ its utility must come speci — ically — rom being secret, not merely — rom being use — ul. B. It must be not generally known in the relevant industry —­ i — it is common knowledge, it con — ers no competitive advantage.

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 55 1/12/26 2:51 PM 56 2 • Inventorying and Classi — ying Trade Secrets

                                    C. It must be not readily ascertainable by proper means —­ i ---  competitors
                                       could easily  --- igure it out on their own, secrecy is not what makes it
                                       valuable.
                               ­These three ideas together de --- ine the l­egal meaning o ---  “­independent economic
                            value  --- rom secrecy.” Some courts analyze them together; ­others treat them as dis-
                            tinct  --- actual questions. ­Either way, all three must be true  --- or this ele­ment to be satis-

ied. I — the in — ormation is valuable but generally known, or secret but easy to reverse engineer, it ­will not quali — y — or protection. Understanding how ­these ­ — actors work together is essential — or identi — ying and prioritizing protectable trade secrets in a business setting.

                                 2.3.2.1. Independent Economic Value
                               The second ele­ment o ---  the trade secret test begins with the idea that the in --- orma-
                            tion must be valuable. In this context, “value” re --- ers to use --- ulness —­ in --- ormation that
                            contributes meaning --- ully to the operations or success o ---  a business. But not all types
                            o ---  value quali --- y. Trade secret law is concerned only with value that is economic. The
                            in --- ormation must improve the business’s position in the marketplace, ­whether by
                            increasing revenue, reducing costs, improving e ---

iciency, enhancing quality, accelerat- ing development, or other­wise creating a competitive advantage. Courts have made clear that other kinds o — value —­ while possibly impor­tant in other contexts —­ do not satis — y this requirement. For example, sentimental value, per- sonal pride, or religious signi — icance do not count. Nor does reputational value, in the sense o — simply wanting to prevent embarrassment or criticism. ­These may support claims in de — amation, contract, or other areas o — law —­ but they are not part o — the trade secret — ramework. This value must be economic in nature. That is, the in — ormation must make a di — -


erence to the business’s pro — itability, e —


iciency, or market standing. Courts accept that this value can take many — orms. It might increase revenues, reduce costs, improve decision-­making, enhance product quality, or position the com­pany to act more e —


ectively than competitors. Crucially, the in — ormation need not be currently mon- etized —­ it may quali — y even i — it has only potential economic value, so long as ­there is a reasonable basis to believe it could be leveraged — or competitive gain in the ­ — uture.

                                                Secrecy Can Evidence Economic Value

                                                           Religious Technology Center v. Lerma
                                                            908 F. Supp. 1362 (E.D. Va. 1995)
                                 The Church o ---  Scientology claimed trade secret protection over con --- iden-
                                 tial religious training materials known as the “Advanced Technology” docu-
                                 ments. The Church charged members substantial  --- ees to access these materials
                                 and imposed strict con --- identiality rules. This commercial model showed that

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 56 1/12/26 2:51 PM 2 • Inventorying and Classi — ying Trade Secrets 57

                     spiritual or ideological in --- ormation can generate independent economic value
                     when access is monetized and restricted through secrecy. However, the Church
                     ultimately lost trade secret protection a --- ter the materials were placed in a public
                     court  --- ile  --- or 28 months and then posted on the Internet. The court held that
                     once the documents entered the public domain, they could no longer quali --- y as
                     trade secrets, regardless o ---  their prior economic value. The case illustrates that
                     even religious or philosophical materials may receive trade secret protection
                     based on economic value stemming  --- rom secrecy, but that protection is irrevo-
                     cably lost when in --- ormation becomes publicly available.



                    Importantly, the economic value must also be ­independent, meaning it comes spe-
                ci --- ically  --- rom the in --- ormation’s being secret. It is not enough that the in --- ormation is
                use --- ul to the com­pany; the value must derive  --- rom the  --- act that ­others do not know it.
                I ---  the same bene --- it would remain even ­a --- ter public disclosure, the in --- ormation does
                not meet this standard. This exclusivity is the  --- oundation o ---  trade secret protection:
                it rewards businesses that develop valuable knowledge and success --- ully keep it out o ---

                competitors’ hands.
                   Some courts describe this as a test o ---  competitive harm: Would a rival gain a
                meaning --- ul advantage by acquiring the in --- ormation? I ---  so, that’s a strong indication
                that the in --- ormation has i­ndependent economic value. I ---  not —­ i ---  the in --- ormation
                provides no edge or is already in general use —­ then trade secret law o ---

ers no pro- tection. To illustrate this point, it helps to consider examples o — what does and does not count. In — ormation that may have ­independent economic value includes: • Con — idential manu — acturing techniques that lower production costs • Internal pricing data and customer pro — iles that improve sales targeting • Strategic business plans, market entry timing, or investment — orecasts • Proprietary so — tware source code or machine-­learning algorithms • Unreleased product speci — ications or research data

                    In --- ormation that does not have ­independent economic value includes:
                       • Routine internal data, like employee schedules or vacation calendars
                       • Holiday party plans or internal communications with no competitive
                           impact
                       • Common industry practices or generic strategies every­one uses
                       • Public  --- ilings or promotional materials
                       • Outdated projections or speci --- ications no longer in use

                   Fi­nally, it is worth distinguishing this requirement  --- rom secrecy itsel --- . Economic
                value and secrecy are related, but not identical. Some in --- ormation may be secret but

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 57 1/12/26 2:51 PM 58 2 • Inventorying and Classi — ying Trade Secrets

                            trivial —­ and there --- ore not protectable. Other in --- ormation may be use --- ul, but widely
                            known —­ and thus not protectable ­either. The point o ---  this ele­ment is to  --- ocus on value
                            that is created or preserved by the  --- act o ---  secrecy.
                                This test ensures that trade secret law protects knowledge that is both meaning-

ul in the marketplace and unavailable to the public. The next section examines the


irst o — the two secrecy-­related components: ­whether the in — ormation is not generally known to ­others in the relevant — ield.

                                 2.3.2.2. Not Generally Known
                                The second component o ---  the “­independent economic value” ele­ment is that the
                            in --- ormation must be not generally known. This re --- lects the  --- undamental insight
                            ­behind trade secret law: i ---  a business advantage comes  --- rom keeping in --- ormation
                             secret, that advantage dis­appears once the in --- ormation becomes widely available.
                             Trade secret protection ends where public knowledge begins.
                               But the law does not demand total or absolute secrecy. Courts recognize a standard
                            o ---  relative secrecy. In --- ormation can still be protected even i ---  it is known to a small
                            number o ---  ­people so long as ­those ­people are bound by con --- identiality obligations
                            or internal security controls. What ­matters is ­whether the in --- ormation is generally
                            accessible to ­those who could pro --- it  --- rom it —­ competitors, industry peers, or other
                            actors in the marketplace.
                               This is not a bright-­line rule. Courts assess ­whether the in --- ormation is known
                            by enough ­people, in enough places, and through enough channels to eliminate its
                            competitive value as a secret. I ---  so, it no longer quali --- ies  --- or protection. Even a com­
                            pany’s internal knowledge can lose trade secret status i ---  it has been too widely shared
                            internally without proper sa --- eguards.
                               ­There are many ways that in --- ormation can become generally known, some deliber-
                            ate, some accidental:
                                    • Filing  --- or a patent ­will make the disclosed content public, even i ---  the patent
                                       is ­later denied or withdrawn.
                                    • Publishing in --- ormation in academic journals, industry whitepapers, or mar-
                                       keting materials makes it accessible to competitors.
                                    • Disclosing content in court  --- ilings or regulatory submissions can strip it
                                       o ---  protection ­unless speci --- ic con --- identiality procedures (such as protective
                                       ­orders) are in place.
                                    • Broad dissemination within a com­pany, without access controls or con --- iden-
                                       tiality markings, can undermine claims that the in --- ormation was secret.
                                 Conversely, courts have held that in --- ormation is not generally known when:
                                    • It is shared only with employees or partners ­under nondisclosure agreements.
                                    • It is discussed in closed business negotiations where con --- identiality is
                                       implied or  --- ormalized by customary practices and commercial morality.

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 58 1/12/26 2:51 PM 2 • Inventorying and Classi — ying Trade Secrets 59

                       • It is known to a small number o ---  companies in the industry but is not pub-
                           licly available.
                       • It is based on original internal research, planning, or design, and not dupli-
                           cated elsewhere.



                                     Controlled Distribution Preserves
                                              Con --- identiality

                                 Board o ---  Trade o ---  City o ---  Chicago v. Christie Grain & Stock Co.
                                                      198 U.S. 236 (1905)
                     The Board o ---  Trade created valuable grain pricing data, which it distributed
                     only to paying subscribers ­under strict conditions. A competitor acquired and
                     republished the data. The Supreme Court held that the Board’s data remained
                     con --- idential ­because it was not available to the general public. Its value came

rom its controlled and l­imited distribution: a key example o — how relative secrecy can still support ­legal protection.

                   What this ele­ment ultimately asks is ­whether the in --- ormation gives the business a
                competitive advantage ­because ­others in the industry do not have access to it. I ---  so,
                then it is not generally known —­ and it satis --- ies this part o ---  the test.
                   But i ---  the in --- ormation has already “leaked out” into the public domain —­ ­whether
                through external disclosures, shared practices, or  --- ailure to restrict internal access —­ it
                is no longer a secret in the eyes o ---  the law. That is true even i ---  the com­pany continues
                to treat it as con --- idential. Once secrecy is lost, ­legal protection ends.
                   This concept is closely related to yet distinct  --- rom the next ele­ment: ­whether the
                in --- ormation is readily ascertainable. “Not generally known” asks ­whether the in --- or-
                mation is currently available to ­others. “Not readily ascertainable” asks ­whether ­others
                could easily  --- igure it out, even i ---  they ­haven’t yet. Both tests must be satis --- ied. The next
                section turns to that question.

                    2.3.2.3. Not Readily Ascertainable by Proper Means
                    The  --- inal component o ---  the “­independent economic value” ele­ment  --- ocuses not
                on what ­others do know but rather on what they could know. Speci --- ically, it asks
                ­whether the in --- ormation could be discovered by ­others using law --- ul and legitimate
                 e ---

orts. To quali — y as a trade secret, the in — ormation must be not readily ascertainable by proper means. This requirement plays a critical role in separating protectable secrets — rom open knowledge. Even i — in — ormation is currently unknown to competitors, it may not be eligible — or protection i — it can be easily uncovered through commonly accepted

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 59 1/12/26 2:51 PM 60 2 • Inventorying and Classi — ying Trade Secrets

                            methods. The law does not shield businesses  --- rom the risk that ­others might in­de­pen­
                            dently  --- igure ­things out. Instead, it rewards secrecy only when secrecy is necessary
                            to preserve a competitive advantage —­ when the in --- ormation would be di ---

icult — or ­others to obtain without improper conduct. The term “readily ascertainable” re — ers to ­whether the in — ormation could be learned with reasonable e —


ort. The threshold is not impossibility. The question is ­whether the in — ormation is su —


iciently accessible that a skilled person, acting law — ully and without deception, could reproduce or reconstruct it using public tools, market knowledge, or direct analy­sis. For example, a com­pany that releases a physical product into the market cannot claim as a trade secret any aspect o — that product that could be easily reverse engi- neered. Courts have consistently held that reverse engineering —­ care — ully examining a product to understand how it works —­ is a proper means o — discovery. I — the secret can be determined by disassembling the product, conducting standard chemical test- ing, or observing its be­hav­ior in the — ield, then that secret is legally exposed, even i —

                            no one has taken the time to uncover it yet.
                                Similarly, courts recognize that companies may arrive at the same in --- ormation
                            through ­independent development. I ---  two  --- irms, working separately and without col-
                            lusion, reach the same technical or strategic insight, each has the right to use that
                            in --- ormation. Trade secret protection does not grant exclusivity over knowledge that
                            ­others can law --- ully invent on their own.
                               Likewise, courts reject claims that rest on in --- ormation  --- ound in public sources,
                            even i ---  a com­pany was the  --- irst to compile or ­organize that data. I ---  the core details are
                            published in regulatory  --- ilings, government databases, academic journals, or other
                            public repositories, the  --- act that a competitor could gather and synthesize them with-
                            out wrongdoing makes the resulting in --- ormation unprotectable.
                              The de --- ining theme ­here is accessibility through honest e ---

ort. I — the path to dis- covery is short, clear, and law — ul, the law does not bar ­others — rom taking it. That is why courts assess not only the originality or use — ulness o — the in — ormation but also how di —


icult it would be — or ­others to learn it using conventional tools or standard pro — essional diligence. However, ­there are many situations where in — ormation is not readily ascertainable. A ­process that is used ­behind closed doors, embedded in a secure system, or tied to subtle re — inements not vis­i­ble — rom the — inal product may remain secret even i — the end result is public. In Hertz v. Luzenac Group, the court recognized that although each individual step in the talc manu — acturing ­process was known in the industry, Luzenac Group’s speci — ic combination and sequence o — ­those steps had not been discovered. The court emphasized that it was not obvious how to arrange the ­process in the same way, and that di —


iculty is what made the ­process not readily ascertainable. What ­matters is the e —


ort and expertise required. I — reverse engineering would take weeks o — trial and error, require special equipment, or depend on unlikely insight, courts may — ind that the in — ormation is not readily obtainable. But i — the discovery

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 60 1/12/26 2:51 PM 2 • Inventorying and Classi — ying Trade Secrets 61

                could be made quickly and easily by someone with standard tools and industry
                knowledge, protection ­will not apply.
                   At the same time, trade secret law draws a bright line between proper and improper
                means o ---  discovery. Only discovery by proper means —­ meaning honest, law --- ul, and
                ethical conduct —­ counts against protection. I ---  a competitor learns the in --- ormation
                through the --- t, deception, bribery, hacking, or breach o ---  contract, that acquisition is
                legally improper, and the trade secret remains intact.
                   Statutes like the UTSA and the DTSA de --- ine improper means to include the --- t;
                bribery; misrepre­sen­ta­tion; breach o ---  a con --- identiality duty; or espionage, ­whether
                physical or electronic. Courts have expanded on t­hese examples to include cyber
                intrusions, phishing schemes, employee disloyalty, and violations o ---  nondisclosure
                agreements. In ­these cases, the use o ---  the in --- ormation is misappropriation, and trade
                secret law provides remedies even i ---  the in --- ormation could theoretically be reverse
                engineered. The issue is not ­whether discovery was pos­si­ble but instead ­whether it
                was done the right way.
                    This distinction serves a  --- undamental policy goal: encouraging  --- air competition
                without endorsing misconduct. I ---  a competitor works in­de­pen­dently to replicate a
                product or ­process using proper techniques, the law protects their right to do so. But
                i ---  they cross ethical or ­legal bound­aries to gain access to con --- idential in --- ormation, that
                conduct violates trade secret protections —­ even i ---  the in --- ormation might have been
                discoverable by other means.



                                  Reverse Engineering Is (Generally) Not
                                            Misappropriation

                                                           Chicago Lock Co. v. Fanberg
                                                           676 F.2d 400 (9th Cir. 1982)
                     Chicago Lock sold high-­security locks that shared a common key code system.
                     Locksmiths who purchased the locks began reverse engineering the codes and
                     publishing them in re --- erence guides. The com­pany sued to stop this, arguing
                     that the keying system was a trade secret. The court disagreed. It  --- ound that
                     the locks ­were publicly available and the internal coding could be discovered
                     through law --- ul examination. ­Because the in --- ormation was readily ascertain-
                     able by anyone who purchased the product and studied it, it did not quali --- y as
                     a trade secret. This case demonstrates that trade secret protection ends where
                     law --- ul discovery begins.



                   In sum, the third and  --- inal part o ---  the “­independent economic value” ele­ment asks
                ­whether the in --- ormation is di ---

icult to obtain through law — ul methods. The law ­ — avors protecting in — ormation that cannot be easily reconstructed or — ound using proper

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 61 1/12/26 2:51 PM 62 2 • Inventorying and Classi — ying Trade Secrets

                            diligence. When secrecy makes discovery genuinely di ---

icult, the ­owner retains pro- tection. When discovery would be obvious, routine, or trivial, the law steps aside. With this — inal component established, we have now — ully unpacked the second ele­ ment o — the trade secret test. We turn next to the third and — inal requirement: ­whether the in — ormation has been subject to reasonable e —


orts to maintain its secrecy.

                            2.3.3. Subject to Reasonable E ---

orts to Maintain Secrecy Trade secret law protects secrets —­ but only when the ­owner acts like they are secret. The — inal and perhaps most impor­tant ele­ment in the ­legal test is ­whether the in — ormation has been subject to reasonable e —


orts to maintain its secrecy. This is not a question o — per — ect security. It is a question o — seriousness, discipline, and consistency. The law does not require that only one person know the secret. Nor does it require vaults, encryption, or locked rooms in ­every case. What it requires is evidence that the business took a —


irmative steps to limit disclosure and prevent unauthorized use. That includes policies, contracts, markings, access restrictions, training, and other internal practices that signal to employees and partners that the in — ormation is not


or public consumption. Courts ask ­whether the com­pany behaved in a way that re — lects an expectation o —

                            con --- identiality. I ---  a business shares in --- ormation casually,  --- ails to use nondisclosure
                            agreements, leaves documents unprotected, or allows access without controls, it may
                            lose trade secret protection even i ---  the in --- ormation itsel ---  remains unknown to the
                            public. The law ­will not save a com­pany  --- rom its own carelessness.
                               At the same time, the e ---

orts must be proportionate. What counts as reasonable depends on the nature o — the business, the sensitivity o — the in — ormation, and the resources available. A small com­pany with l­imited in — rastructure is not held to the same standard as a multinational corporation. But both are expected to do what is reasonably within their power to preserve secrecy. One o — the most common — ailures occurs when businesses require signed NDAs but do nothing ­else. A nondisclosure agreement is a good start, but it is not enough on its own. I — the NDA is never explained, en — orced, or integrated into com­pany culture, courts may see it as win­dow dressing rather than real protection. The same is true


or con — identiality labels that are never backed up by meaning — ul access controls or consistent reminders. On the other hand, when companies combine contractual protections with access limitations, employee training, document labeling, and internal discipline, courts are


ar more likely to uphold the existence o — a trade secret. What ­matters is the overall pattern. The com­pany must treat the in — ormation like a secret at ­every stage o — its use and ­handling.

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 62 1/12/26 2:51 PM 2 • Inventorying and Classi — ying Trade Secrets 63

                                          NDAs Alone Are Not Enough  --- or
                                              “Reasonable E ---

orts”

                                                           nClosures Inc. v. Block & Co.
                                                           770 F.3d 598 (7th Cir. 2014)
                     nClosures developed a metal iPad case and entered into a manu --- acturing
                     relationship with Block & Co. ­under a con --- identiality agreement. Block l­ater
                     brought a similar product to market, and nClosures sued  --- or trade secret mis-
                     appropriation. The court  --- ound that although t­here was an NDA in place,
                     nClosures had  --- ailed to take other reasonable ­measures to maintain secrecy. It
                     had shared design  --- iles without restriction, displayed the product publicly, and
                     taken no additional steps to guard the in --- ormation. The court ruled that the
                     alleged secret had not been adequately protected and there --- ore did not quali --- y

or trade secret status. This case illustrates that — ormal agreements alone are not enough; businesses must actively maintain secrecy in practice.

                  The l­egal standard is reasonableness, not per --- ection. But reasonableness means
                more than good intentions. It means acting in a way that a court can recognize as
                consistent with secrecy. When companies show that they care about protecting in --- or-
                mation, courts are willing to help. When companies are careless, courts ­will not inter-
                vene. Trade secret law protects the diligent, not the indi ---

erent.

                            2.4. Prioritizing Trade Secrets by
                           Economic and Strategic Importance
                   Once a com­pany identi --- ies what quali --- ies as a trade secret, the next challenge is
                deciding which secrets ­matter most. Not all secrets are equally valuable. Some drive
                revenue, shape strategy, or protect the business  --- rom collapse. ­Others are use --- ul but
                replaceable. Treating ­every trade secret as equally impor­tant leads to wasted e ---

ort. Trade secret protection is resource-­intensive. A com­pany must know where to con- centrate its energy. Prioritization is a ­matter o — both economics and judgment. The l­egal test tells us ­whether something quali — ies as a trade secret. But the inventory is also a business tool, and businesses need to know which secrets are most worth de — ending. A small startup might have only a hand — ul o — high-­priority secrets. A large — irm might have dozens spread across departments. Regardless o — size, ­every ­organization must make distinctions.

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 63 1/12/26 2:51 PM 64 2 • Inventorying and Classi — ying Trade Secrets

                               Some secrets protect what no competitor can match. ­Others allow the com­pany to
                            move  --- aster, cheaper, or more e ---

ectively than rivals. Still ­others are impor­tant but not critical; they contribute to the business but their loss would not cripple it. A — ew may be legacy items that once mattered but no longer de — ine the com­pany’s position in the market. The goal o — prioritization is not to minimize protection — or the lower tiers but rather to recognize that not every­thing can be treated as mission-­critical. The inventory must re — lect ­these di —


erences. Each trade secret should be catego- rized by priority level based on what would happen i — the secret ­were exposed. That exposure might come through misappropriation, reverse engineering, law — ul disclo- sure, or carelessness. The point is to evaluate how much harm would result and how di —


icult it would be to replace the advantage. ­There are no rigid — ormulas. But companies can generally classi — y their secrets into three broad tiers. Some trade secrets are high priority —­ ­these are the crown jewels, the secrets that shape every­thing ­else. ­Others are medium priority —­ they ­matter, but they can be rebuilt or worked around. The rest are low priority —­ they still quali — y as trade secrets, but their strategic value is modest or declining. The next three sections explain each o — ­these categories in more detail. The distinc- tions are not just — or theory. They shape how the com­pany allocates protection, assigns responsibility, and prepares — or potential litigation. A good inventory does more than identi — y secrets. It tells the business which secrets it cannot a —


ord to lose.

                            2.4.1. High-­Priority Trade Secrets
                               High-­priority trade secrets are the ones a business cannot a ---

ord to lose. ­These are the assets that provide a decisive competitive advantage —­ knowledge that would cause serious harm i — it ­were disclosed or misappropriated. They o — ten support core products, proprietary technologies, key customers, or strategic relationships. Without them, the business would su —


er immediate commercial damage or long-­term strate- gic erosion. In many cases, ­these secrets are directly tied to revenue. A proprietary manu — ac- turing ­process that allows a com­pany to produce at hal — the cost o — its competitors belongs in this category. So does an algorithm that powers a — lagship product, a design no one ­else can replicate, or a dataset that underpins high-­value decision-­making. When a trade secret loss would mean loss o — customers, collapse o — margins, or the end o — a product line, the priority is obvious. But not all high-­priority secrets are vis­i­ble on a balance sheet. Some are early-­stage technologies that have not yet reached the market. ­Others are strategic roadmaps or internal playbooks that guide ­ — uture growth. I — a competitor gained access to ­those documents, they might not destroy the com­pany, but they could erode its ability to lead. Priority is about more than pre­sent value. It is also about vulnerability, timing, and the com­pany’s broader trajectory.

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 64 1/12/26 2:51 PM 2 • Inventorying and Classi — ying Trade Secrets 65

                   ­These are the secrets that demand the most protection. They should be subject to
                the strongest contractual sa --- eguards, the tightest access restrictions, and the most
                rigorous monitoring. In some cases, they should be kept entirely out o ---  vendor rela-
                tionships or third-­party plat --- orms, even i ---  ­doing so creates operational  --- riction. The
                cost o ---  incon­ve­nience is small compared to the cost o ---  exposure.
                   Courts are more likely to en --- orce trade secret claims when the in --- ormation clearly
                mattered to the business. A com­pany that can point to a care --- ully guarded secret that
                underpins a  --- lagship product ­will have a  --- ar easier time proving misappropriation
                than one that over-­claims routine procedures. Prioritization signals to courts that the
                com­pany understands its own assets and has acted accordingly.


                                            High Economic Value Bolsters
                                                 Trade Secret Status

                                                           Boeing Co. v. Sierracin Corp.
                                                            738 P.2d 665 (Wash. 1987)
                     Boeing developed proprietary methods  --- or manu --- acturing aircra --- t windshields
                     and treated t­hese techniques as trade secrets. When a supplier began using
                     similar pro­cesses, Boeing sued. The court upheld the claim, emphasizing the
                     commercial importance o ---  the techniques and Boeing’s e ---

orts to protect them. The decision rein — orced that where a secret is both highly valuable and care — ully guarded, the law ­will provide strong protection. Boeing’s success in the case re — lected not only the uniqueness o — the in — ormation but also the clarity with which the com­pany had treated it as a critical asset.

                   A business does not need to have many high-­priority secrets, but it must know
                which ones  --- all into that category —­ and treat them accordingly. ­These are the assets
                that de --- ine the com­pany’s edge. Without them, the business is just another competitor.


                2.4.2. Medium-­Priority Trade Secrets
                    Medium-­  priority trade secrets ­   matter. They contribute to the business’s
                ­per --- ormance, e ---

iciency, or strategy. But they are not essential to survival. I — lost, they would cause — riction, not — ailure. The com­pany might need to retool a ­process, adjust pricing, or rebuild relationships. But it could do so without catastrophic disruption. ­These secrets o — ten re — lect operational experience. A pricing — ormula that helps optimize margins across multiple markets might — all in this category. So might a vendor negotiation strategy, a bundled ­service approach, or an internal work — low that shortens production time. ­These are not secrets that competitors could never

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 65 1/12/26 2:51 PM 66 2 • Inventorying and Classi — ying Trade Secrets

                            develop. They are secrets that the com­pany developed  --- irst and that still o ---

er a mean- ing — ul edge. In some cases, a trade secret’s priority is a — unction o — time. A strategy document might be high priority be — ore a product launch but drop to medium priority ­a — ter the product is released. A supplier arrangement might be sensitive while a deal is in negotiation but less impor­tant once terms are locked in. Prioritization is dynamic. It re — lects the secret’s current role in the business, not just its theoretical value. Medium-­priority secrets deserve protection, but not at all costs. A com­pany might share ­these secrets with trusted partners ­under contract. It might allow broader inter- nal access with appropriate training and reminders. What ­matters is proportional- ity. The security ­measures should re — lect the value o — the secret and the risk o — loss. Over-­protecting ­these assets can waste resources or slow down operations. Under-­ protecting them can invite preventable loss. Companies sometimes try to in — late the importance o — ­these secrets during litiga- tion. Courts are not persuaded by exaggeration. I — the in — ormation was not treated as high-­value at the time o — the alleged misappropriation, courts are unlikely to elevate it ­a — ter the — act. A business that classi — ies its secrets realistically is in a better position to de — end its actions and protect its rights.

                                                           Moderate E ---

orts Su —


ice — or Moderate-­V alue Secrets

                                                 Fred’s Stores o ---  Tennessee, Inc. v. M & P Partners, LLC
                                                2015 U.S. Dist. LEXIS 178745 (N.D. Miss. Dec. 30, 2015)
                                 Fred’s alleged that a  --- ormer business partner misappropriated in --- ormation
                                 about site se­lection  --- or new store locations. The court  --- ound that while the
                                 in --- ormation was not publicly available, it was developed using standard tech-
                                 niques and available data. The business methods had some strategic value, but
                                 they ­were not unique or trans --- ormative. The court treated the in --- ormation
                                 as potentially protectable, but it emphasized that the level o ---  protection must
                                 re --- lect the in --- ormation’s ­actual role in the business. This case illustrates how
                                 courts recognize medium-­priority secrets when they are realistically  --- ramed
                                 and reasonably guarded.



                               Medium-­priority secrets  --- ill the ­middle o ---  the inventory. They are the tools and
                            tactics that help a business compete day to day. Losing them would hurt. But it would
                            not end the game. They require care --- ul protection —­ not the highest wall, but a strong

ence.

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 66 1/12/26 2:51 PM 2 • Inventorying and Classi — ying Trade Secrets 67

                2.4.3. Low-­Priority Trade Secrets
                    Some trade secrets quali --- y  --- or protection ­under the law but carry ­little weight in the
                li --- e o ---  the business. ­These low-­priority secrets may re --- lect routine operations, internal
                pre --- erences, or legacy practices that no longer shape competitive ­per --- ormance. They
                still meet the ­legal de --- inition, and they still deserve reasonable sa --- eguards. But they do
                not demand the same level o ---  attention, investment, or urgency as more critical assets.
                   Low-­priority secrets might include administrative procedures, marginal product
                tweaks, or legacy data that has not been purged. A com­pany’s old pricing models,
                outdated technical documentation, or internal training slides may all be con --- idential
                and nonpublic. But their exposure would not materially damage the business. ­These
                items are worth keeping private, but they are not worth a lawsuit.
                    In practice, low-­priority trade secrets o --- ten enter the inventory not ­because they
                are vital but ­because they quali --- y. The goal o ---  the inventory is to be comprehensive.
                Once an item is identi --- ied as a trade secret, it should be documented. But once docu-
                mented, it should also be evaluated. Companies should not pretend that ­every secret
                is a crown jewel. ­Doing so undermines credibility and creates noise that distracts  --- rom
                what ­really ­matters.
                    Protection  --- or low-­priority secrets should be e ---

icient and proportional. Labeling, basic internal access controls, and standard nondisclosure policies are o — ten enough. I — the business ­later discards the in — ormation, removes it — rom operations, or shares it more broadly, it can be removed — rom the inventory. The point is not to protect every­ thing — orever. The point is to manage secrets wisely. Occasionally, a low-­priority secret becomes more impor­tant over time. A small internal tool might become the — oundation — or a customer-­ — acing product. A minor data set might grow into a strategic asset. Regular inventory updates help businesses spot ­these changes be — ore it is too late. What starts as low-­priority can become critical. But most secrets stay in their lane.

                                 Low-­V alue In --- ormation May Not Quality
                                              as Trade Secrets

                                                    Paragon Techs., Inc. v. United States
                                                      567 F.3d 1329 (Fed. Cir. 2009)
                     Paragon claimed that certain in --- ormation in its contract bidding ­process was
                     con --- idential and misused. The court accepted that some o ---  the in --- ormation
                     may have been nonpublic but  --- ound that it was routine and o ---  ­limited strategic
                     value. The com­pany’s  --- ailure to demonstrate commercial harm or competi-
                     tive consequence led the court to treat the secrets as low-­priority, with l­ittle

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 67 1/12/26 2:51 PM 68 2 • Inventorying and Classi — ying Trade Secrets

                                 justi --- ication  --- or heightened protection. The case illustrates that trade secret law
                                 does not exist to protect every­thing a business pre --- ers to keep private. The
                                 in --- ormation must ­matter.



                               A trade secret inventory is not just a list. It is a map o ---  what the business values.
                            Low-­priority secrets have a place on that map, but they should not draw dispropor-
                            tionate attention. A good inventory gives each secret the protection it deserves —­ and
                            no more than that.



                                                2.5. Creating the Trade Secret
                                                          Inventory
                                Once a com­pany knows what quali --- ies as a trade secret and how valuable each one
                            is, it must take the next step: putting ­those secrets into a usable  --- orm. The inventory is
                            that  --- orm. It is not just a document —­ it is the backbone o ---  the entire protection plan.
                            A well-­built inventory clari --- ies what needs to be protected, how it is being used, and
                            why it ­matters. Without one, even the best ­legal strategies have no  --- oundation.
                                The inventory should be structured as a living document. It is typically ­organized
                            as a spreadsheet or secure database, with each row representing a single trade secret
                            and each column capturing key in --- ormation about it. That includes a short, descrip-
                            tive name; a clear explanation o ---  what the secret is; its classi --- ication as technical,
                            business, or hybrid; its physical or digital location; its priority level; and any special
                            considerations  --- or how it is used or protected. Some companies include additional

ields —­ such as access controls, department owner­ship, or dates o — last review —­ but the core ele­ments are the same across industries. Creating the inventory requires both l­egal and operational judgment. The l­egal team ensures that each item meets the ­legal de — inition o — a trade secret. The business team identi — ies what knowledge is actually in use and what value it provides. Neither side can do the work alone. A ­legal team working in isolation may miss strategically impor­tant assets. A business team working without ­legal guidance may include items that do not quali — y or overlook risks in how secrets are shared. The ­process only works when both perspectives are involved. The inventory is not a dumping ground — or all con — idential in — ormation. It should not include internal chatter, minor ­process tweaks, or marketing slogans ­unless they genuinely meet the l­egal test. At the same time, the threshold — or inclusion should not be too high. Many valuable trade secrets are easy to overlook ­because they are embedded in daily routines. A com­pany’s ability to identi — y ­those quiet advantages o — ten determines how well it protects itsel — in the long run.

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 68 1/12/26 2:51 PM 2 • Inventorying and Classi — ying Trade Secrets 69

                     Precision ­matters. Each trade secret must be described in terms that are speci --- ic
                enough to be understood by someone outside the com­pany yet clear enough to be
                use --- ul internally. A vague entry like “customer strategy” or “pricing tool” provides
                ­little guidance and ­little protection. A strong inventory entry tells you what the secret
                 is, where it resides, how it works, and why it ­matters. It can be read and understood
                 by a judge, a new executive, or a compliance o ---

icer without guesswork. A strong inventory is also de — ensible. I — a dispute arises, the com­pany can point to its inventory to show that the in — ormation was identi — ied, reviewed, and classi — ied long be — ore the con — lict. This is power­ — ul evidence that the secret was real —­ and that the com­pany took reasonable e —


orts to protect it. Courts are more likely to credit trade secret claims that are supported by internal documentation prepared in the ordinary course o — business, not just materials created — or litigation. ­Because the inventory becomes a l­egal and operational tool, it must be updated regularly. But it must — irst be created with care. Many companies start with a working version — ocused on the highest-­priority secrets and expand over time. What ­matters is not that the inventory is per — ect on day one, but that it is structured and taken seriously


rom the beginning. A sloppy or overinclusive inventory can do more harm than good. The — ollowing example illustrates how a well-­organized inventory spreadsheet might be structured. Each entry includes a speci — ic name, a — unctional description, a classi — ication type, a priority level, and other relevant metadata. This is not a checklist o — labels. It is a blueprint — or protection.

                                  ­Table 1. Sample Trade Secret Inventory Spreadsheet­—
                                     Basic Structure  --- or Classi --- ication and Prioritization.

                   Trade Secret Name                       Description         Type      Location     Priority

                  Flavoring                       So --- tware module that                   Internal
                                                                             Technical                High
                  Algorithm                       optimizes ­recipe ratios               Git repo

                                                  Curated list with sales
                  Enterprise                                                             CRM
                                                  notes and renewal          Business                 High
                  Client List                                                            system
                                                  history

                  Targeting                       Digital marketing bid                  AdTech
                                                                             Hybrid                   Medium
                  Formula                         allocation logic                       team  --- iles

                                                  Custom backend tool
                  Internal Admin                                                         Cloud
                                                  with employee usage        Technical                Low
                  Portal                                                                 instance
                                                  data

                  Vendor Rate ­                   Negotiated terms                       ­Legal
                                                                             Business                 Medium
                  Table                           across regions                         Drive

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 69 1/12/26 2:51 PM 70 2 • Inventorying and Classi — ying Trade Secrets

                               A spreadsheet like this can evolve over time. It becomes more use --- ul as the com­
                            pany re --- ines how it describes its secrets and how it understands their role in the busi-
                            ness. Ultimately, the inventory is not just a document —­ it is a way o ---  thinking. It shi --- ts
                            the ­organization  --- rom vague awareness to concrete control. That shi --- t is what turns
                            con --- identiality into protection.




                                               2.6. Common Pit --- alls and Best
                                                  Practices in Inventorying
                                Creating a trade secret inventory is a high-­leverage task. When done well, it
                            becomes a cornerstone o ---  ­legal protection and operational clarity. When done poorly,
                            it becomes a liability —­ con --- using, overbroad, or dangerously incomplete. Many com-
                            panies  --- all into  --- amiliar traps during the inventorying ­process. ­These pit --- alls are avoid-
                            able, but only i ---  they are recognized early.
                               The most common ­mistake is overinclusion. Businesses sometimes attempt to
                            label ­every internal document, communication, or idea as a trade secret. They believe
                            that casting a wide net ­will maximize protection. In real­ity, it undermines credibility.
                            Courts are skeptical o ---  sweeping claims. An inventory that includes routine emails,
                            vague strategies, or public-­ --- acing content suggests that the com­pany does not under-
                            stand what a trade secret is. Worse, it dilutes  --- ocus. When every­thing is marked high-­
                            priority, nothing ­really is.
                               The opposite ­mistake is underinclusion. Some companies build inventories that
                            are too narrow by listing only  --- ormal technologies or customer lists while ignoring
                            embedded knowledge that lives inside teams. A unique onboarding ­process, a high-­
                            per --- orming internal dashboard, or a supplier negotiation sequence may not  --- eel like
                            “IP” but can be a valuable trade secret. Businesses that  --- ocus only on patents, prod-
                            ucts, or technical  --- iles o --- ten miss their own competitive advantages. A good inventory
                            demands curiosity, not just compliance.
                                Another  --- requent error is lack o ---  speci --- icity. Entries like “sales playbook,” “product
                            roadmap,” or “pricing method” are too vague to support l­egal en --- orcement. Courts
                            ­will not protect abstractions. I ---  a trade secret cannot be described with precision, it
                             cannot be de --- ended. The inventory must describe what the secret is, how it works,
                             and what makes it distinct. Speci --- icity also helps internally. When teams know exactly
                             what the secret is, they are more likely to treat it properly.
                               Some inventories  --- ail ­because they are treated as static. A one-­time list created dur-
                            ing a compliance sprint is not a protection plan. Trade secrets change as businesses
                            evolve. New products launch, old methods are retired, strategies shi --- t. A use --- ul inven-
                            tory must be reviewed and revised regularly. Companies that revisit their inventory

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 70 1/12/26 2:51 PM 2 • Inventorying and Classi — ying Trade Secrets 71

                once a year or during major operational changes are  --- ar better positioned to respond
                to risk or litigation than ­those that treat it as a  --- inished product.
                   Owner­ship is another challenge. In many ­organizations, no one is clearly respon-
                sible  --- or the inventory. ­Legal teams may dra --- t the  --- ramework but have no visibility into
                day-­to-­day practices. Business teams may understand the secrets but see inventorying
                as someone ­else’s job. The result is an incomplete or outdated list. Success --- ul compa-
                nies designate a responsible party or team, ensure collaboration across departments,
                and integrate inventory maintenance into regular work --- lows.
                   Fi­nally, many businesses  --- ail to link the inventory to en --- orcement. When a trade
                secret is misappropriated, the com­pany must be able to prove that the in --- ormation
                was identi --- ied, protected, and valued be --- ore the breach. A trade secret that appears
                only in a litigation brie ---  ­will not persuade a court. But a secret that was clearly listed,
                care --- ully described, and periodically reviewed tells a di --- ­ --- er­ent story. It shows that the
                com­pany knew what it was protecting —­ and treated it accordingly.



                                  Over-­Claiming Yet Under-­D ocumenting
                                            “Secret” Pro­c esses

                                                          Hertz v. Luzenac Group
                                                       576 F.3d 1103 (10th Cir. 2009)
                     Luzenac claimed that its talc puri --- ication ­process was a trade secret, but it

ailed to clearly document what the ­process involved or how it was protected. The com­pany asserted broad rights over multiple ele­ments o — its operations, without distinguishing which components ­were critical or how they had been maintained as con — idential. The court expressed skepticism about ­these sweep- ing claims and ultimately narrowed the scope o — protection. The case illustrates that overclaiming weakens credibility, and that a trade secret inventory must be both speci — ic and supported by evidence o — active protection.

                   A trade secret inventory is only as strong as the ­process ­behind it. Simply stamp-
                ing “CONFIDENTIAL” on ­every document ­will not hold up in court. Precision,
                balance, regular updates, and clear owner­ship are not just best practices but rather
                are the di ---

erence between protection that works and protection that — ails when it is needed most.

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 71 1/12/26 2:51 PM 72 2 • Inventorying and Classi — ying Trade Secrets

                                          2.7. Integrating the Inventory Into
                                                  Business Operations
                               A trade secret inventory is not use --- ul i ---  it sits on a shel --- . It must become part o ---  how
                            the business actually  --- unctions. The strongest protection plans are not ­legal arti --- acts
                            but rather are operational realities. That means the inventory must be integrated into
                            everyday decisions, not just maintained as a static document  --- or ­ --- uture litigation.
                               Integration begins with access. The ­people responsible  --- or protecting trade secrets
                            must know what ­those secrets are. That includes ­legal counsel, security o ---

icers, team leads, and business executives who work in areas where the secrets are used. I — ­these individuals cannot easily — ind, understand, or re — erence the inventory, it cannot guide be­hav­ior. The inventory must be secure, but it must also be usable. Integration also requires alignment. Internal policies should re — lect the distinctions made in the inventory. I — a trade secret is marked high priority, it should be subject to stronger protections than a low-­priority item. Contracts, training programs, and access protocols should all respond to the classi — ication and prioritization decisions embedded in the inventory. When a secret is labeled as impor­tant but treated casually, the inconsistency undermines ­legal credibility and creates operational risk. The inventory should in — luence who gets access to what. This is not just about cybersecurity. It is about personnel decisions. Teams working with sensitive in — or- mation should be trained in how to ­handle it. Employees should be brie — ed on what quali — ies as a trade secret and why it ­matters. Contractors and vendors should be given access only to what they need —­ and only ­a — ter appropriate agreements are in place. The inventory can help structure ­these controls by identi — ying where the risks lie and which assets require care — ul ­handling. Business planning is another place where the inventory must play a role. I — a team is preparing to launch a new product or enter a new market, the inventory should be consulted. Are any o — the relevant assets already in the inventory? Do new trade secrets need to be added? Are existing secrets being used in new ways that create di — ­


er­ent exposure risks? Treating the inventory as a living re — erence helps ensure that trade secret protection is part o — strategy, not just an a — terthought. Litigation readiness also depends on integration. I — a com­pany alleges trade secret misappropriation, it must show not only that the secret was documented but also that it was treated as con — idential in practice. Courts look — or consistency between the inventory and the com­pany’s operational be­hav­ior. I — the inventory is maintained separately — rom the way the business runs, it is unlikely to carry much weight when it ­matters most. The goal is not to turn ­every employee into a trade secret ­lawyer. The goal is to cre- ate an ­organization that knows what its secrets are and acts accordingly. That culture starts with visibility. It grows through habits and structure. And it succeeds when the inventory moves out o — the ­legal department and into the heart o — the business.

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 72 1/12/26 2:51 PM 2 • Inventorying and Classi — ying Trade Secrets 73

                                  2.8. Maintaining and Updating
                                          the Inventory
                   A trade secret inventory is not a one-­time proj­ect. It must be updated, maintained,
                and revisited as the business evolves. In --- ormation that quali --- ies as a trade secret ­today
                may lose its value tomorrow. A new initiative may generate protectable knowledge
                that is never captured ­unless someone adds it to the rec­ord. Without updates, even
                the best inventory becomes stale, and a stale inventory is almost as dangerous as no
                inventory at all.
                    Trade secrets change ­because businesses change. New products are launched. Old
                ­services are retired. Employees come and go. Vendors are replaced. A ­process that
                 was once con --- idential may become public. A customer list may grow outdated. A
                 con --- idential tool may be made obsolete by new technology. I ---  the inventory does not
                 re --- lect ­these changes, it creates a  --- alse sense o ---  security.
                   Regular updates should be scheduled and structured. Many companies align inven-
                tory reviews with annual audits, major product cycles, or key moments in personnel
                transitions. The right interval depends on the pace and nature o ---  the business. A  --- ast-­
                moving tech com­pany may need quarterly updates. A more stable operation may  --- ind
                that once or twice a year is enough. What ­matters is that updates happen as a ­proactive
                matter o ---  ­process, not as a reaction to litigation or crisis.
                    Maintenance is not just about adding new secrets. It is also about removing or
                reclassi --- ying old ones. I ---  a trade secret is no longer used, or i ---  the com­pany has ­stopped
                taking steps to protect it, it may no longer quali --- y. Leaving it in the inventory anyway
                weakens the credibility o ---  the ­whole system. It suggests that the com­pany does not
                ­really know which o ---  its assets are con --- idential. Pruning the inventory is just as impor­
                 tant as expanding it.
                   Updating also means revisiting classi --- ications and priority levels. A secret that was
                once low-­priority may become critical i ---  a new product depends on it. A high-­priority
                secret may be downgraded i ---  the business shi --- ts direction. ­These changes o --- ten go
                unnoticed ­unless the com­pany builds time  --- or re --- lection into its ­process. Without
                that discipline, the inventory becomes  --- rozen in the past, even as the business moves

orward. Owner­ship is key. Someone must be responsible — or keeping the inventory cur- rent. That person or team must have access to the l­egal, operational, and technical knowledge needed to evaluate what has changed. They must also have the authority to prompt revisions and the judgment to know when they are necessary. In some ­organizations, this role — alls to in-­house counsel. In ­others, it is handled by compli- ance, risk management, or in — ormation security. The right structure varies. The need


or clear responsibility does not. A well-­maintained inventory tells a story o — awareness. It shows that the com­ pany knows what ­matters, monitors how its assets are used, and adjusts its protection

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 73 1/12/26 2:51 PM 74 2 • Inventorying and Classi — ying Trade Secrets

                            accordingly. Courts are more likely to re­spect that kind o ---  system. So are employees,
                            partners, and investors. A trade secret inventory is not just a document. It is a rec­ord
                            o ---  care. Keeping it current is how that care becomes credible.



                                              2.9. Creating an ­Organizational
                                               Culture Around the Inventory
                               The trade secret inventory is more than a rec­ord. It is a re --- lection o ---  how seriously
                            a com­pany treats its own knowledge. The best protection plans do not depend solely
                            on ­legal documents or technical sa --- eguards. They depend on ­people —­ on the habits,
                            expectations, and norms that guide how in --- ormation is handled ­every day. For the
                            inventory to work, it must be embedded in the com­pany’s culture.
                                A culture o ---  con --- identiality does not arise on its own. It must be modeled, commu-
                            nicated, and rein --- orced. Employees must understand what quali --- ies as a trade secret,
                            why t­hose secrets ­matter, and how their own actions contribute to or undermine
                            protection. That understanding begins with visibility. The inventory makes secrecy
                            vis­i­ble. It shows that the com­pany takes its knowledge seriously and expects ­others
                            to do the same.
                                Creating a culture around the inventory means that con --- identiality is not just a
                            ­legal requirement but rather is part o ---  how ­people do their jobs. Employees are trained
                             to recognize sensitive in --- ormation. New hires are brie --- ed on the types o ---  trade secrets
                             they may encounter. Departing employees are reminded o ---  their continuing obliga-
                             tions. When ­people see that the com­pany knows what its secrets are and that it moni-
                             tors how they are treated, be­hav­ior changes.


                                             A Culture o ---  Secrecy Supports a Finding
                                                        o ---  Trade Secrets

                                                   Data General Corp. v. Digital Computer Controls, Inc.
                                                             357 A.2d 105 (Del. Ch. 1975)
                                 Data General sued a competitor and  --- ormer employee  --- or misappropriating
                                 internal schematics used in computer hardware design. The court  --- ound that
                                 Data General had built a strong culture o ---  con --- identiality by using access con-
                                 trols, training, and internal policies to ensure its employees understood their
                                 obligations. ­Because the com­pany took secrecy seriously in both policy and
                                 practice, the court  --- ound its trade secret protections en --- orceable. This case
                                 illustrates how a com­pany’s internal discipline and cultural rein --- orcement can
                                 tip the balance in ­ --- avor o ---  ­legal protection.

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 74 1/12/26 2:51 PM 2 • Inventorying and Classi — ying Trade Secrets 75

                    This culture also depends on access and collaboration. The inventory must be
                known to ­those who work with the secrets. Engineers, salespeople, product teams,
                l­egal, and IT must all play a role in identi --- ying, classi --- ying, and protecting in --- or-
                 mation. When di --- ­ --- er­ent parts o ---  the ­organization treat secrets di ---

erently, the gaps become risks. But when every­one works — rom the same map, the business acts with coherence and purpose. Accountability is another key. Culture is not created by slogans or policies alone. It is created by what ­people see happening around them. I — violations go unaddressed, the inventory becomes irrelevant. I — secrecy is en — orced only during litigation, the protection e —


ort ­will be too late. A culture o — con — identiality takes root when ­people understand that the inventory ­matters —­ and that — ailing to — ollow it has consequences.

                                           Lax Maintenance Dooms Trade
                                                   Secret Claim

                                                     Fail-­Sa --- e, LLC v. A.O. Smith Corp.
                                                        674 F.3d 889 (7th Cir. 2012)
                     Fail-­Sa --- e developed a pool sa --- ety technology and shared it with a prospective
                     partner without using any con --- identiality agreements, markings, or internal
                     secrecy practices. The court  --- ound that Fail-­Sa --- e had  --- ailed to treat the in --- or-
                     mation as a secret in any meaning --- ul way. It lacked training, internal docu-
                     mentation, and consistent en --- orcement. As a result, the court held that the
                     in --- ormation did not quali --- y as a trade secret. The case demonstrates that with-
                     out a  --- unctioning culture o ---  con --- identiality, even valuable business knowledge
                     may be unprotected.



                   Some o ---  the strongest trade secret programs are ­those where the inventory is not
                treated as a compliance tool but rather as a strategic asset. The ­people who create and
                manage the secrets understand their importance. The executives who lead the com­
                pany use the inventory to set priorities. The culture that grows  --- rom that alignment
                is not just protective —­ it is productive. It encourages  --- ocus, reduces duplication, and
                builds shared understanding across teams.
                   Trade secrets do not live on paper. They live in ­people’s heads, in the systems they
                build, and in the relationships they manage. A trade secret protection plan only works
                when the inventory becomes part o ---  how ­those ­people think and act. That is what it
                means to build a culture around it. Once that culture takes hold, the inventory is no
                longer a document. It is a mindset.

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 75 1/12/26 2:51 PM 76 2 • Inventorying and Classi — ying Trade Secrets

                                                       2.10. From Classi --- ication
                                                               to Action
                               ­Every e ---

ort to protect trade secrets begins with a single step: identi — ying what you are protecting. That step is not theoretical. It is concrete. It requires clear descrip- tions, principled classi — ications, and hard decisions about what ­matters most. A strong inventory captures ­those judgments. It — orces a business to recognize the shape and value o — its own knowledge —­ sometimes — or the — irst time. The ­legal test provides the boundary. Not every­thing a com­pany wants to protect ­will quali — y. But within ­those bound­aries, the inventory gives structure to what was previously scattered and unspoken. It distinguishes between di — ­ — er­ent kinds o — secrets and di — ­ — er­ent levels o — strategic weight. It replaces vague intuitions with ­organized insight. But the inventory is only the beginning. It is a snapshot o — knowledge, not a shield. For that knowledge to remain protected, it must be actively managed. The inventory must become part o — the business —­ not just a rec­ord o — what the business knows, but a guide — or how it operates. That work continues in the next chapter. Once a com­pany has identi — ied its trade secrets and prioritized them, it must con — ront the next challenge: how ­those secrets might be lost. ­Legal protection depends not only on what you have but also on how vulnerable it is to exposure. Classi — ication without risk assessment is incomplete. The question now is not what the secrets are but rather how likely they are to escape.

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 76 1/12/26 2:51 PM Chapter 3 Assessing Risks and Mitigating Vulnerabilities

                    Trade secrets are only valuable as long as they remain secret. That ­simple premise
                underlies ­every chapter in this book, but nowhere is it more critical than ­here. Even the
                strongest ­legal claim cannot protect in --- ormation that has already leaked. Once secrecy
                is lost —­ ­whether through the --- t, error, or indi ---

erence—­ the trade secret dis­appears. This chapter addresses that challenge directly. It explains how companies can anticipate, analyze, and manage the many ways in which their secrets might be exposed. E —


ective protection begins with understanding what can go wrong. Trade secret law is reactive by nature: it allows ­owners to sue ­a — ter a misappropriation occurs. But smart ­organizations do not wait — or a breach —­ they identi — y where they are most vulnerable and act to reduce ­those risks. This chapter builds that capacity. It begins by de — ining the di —


erence between risk and uncertainty, two related but distinct chal- lenges in managing secrecy. It then explores common sources o — exposure —­  — rom insider threats to external partners to technology-­driven leaks —­ and outlines struc- tured methods — or assessing which secrets are most at risk. Fi­nally, it shows why risk assessment is not just a technical exercise but a strategic discipline, one that blends analytics with judgment, and law with leadership. For ­organizations seeking to protect their competitive edge, this chapter provides the tools and — rameworks to identi — y threats be — ore ­those threats turn into losses they cannot reverse.

                                         3.1. The Centrality o ---  Risk
                                                Assessment
                   Trade secret law o ---

ers power­ — ul remedies, but only ­a — ter the damage has been done. A success — ul lawsuit might lead to an injunction, damages, or even criminal penalties —­ but none o — t­hose outcomes can restore the value o — a secret that has already spread. This makes trade secrets uniquely vulnerable. Unlike other — orms o —

                intellectual property, their ­legal existence depends on the practical real­ity o ---  ongoing
                secrecy. Once that secrecy is compromised, the right dis­appears with it.

                                                             77

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 77 1/12/26 2:51 PM 78 3 • Assessing Risks and Mitigating Vulnerabilities

                               That is why risk assessment is not just a l­egal tool. It is a strategic imperative. To
                            protect what is secret, a business must  --- irst understand where its secrets are exposed.
                            Risk is not something that can be wished away. It comes  --- rom employees, contrac-
                            tors, vendors, outdated systems, poor training, loose policies, or ­simple ­human error.
                            Most trade secret  --- ailures are not dramatic acts o ---  the --- t. They are slow leaks, casual
                            oversights, or breakdowns in ­process. And they are almost always  --- oreseeable —­ i ---

                            someone had taken the time to ask the right questions.
                                This chapter begins with a  --- oundational distinction: risk is di --- ­ --- er­ent  --- rom uncer-
                            tainty. Risk involves quanti --- iable threats —­ ­things that can be ­measured, modeled,
                            and prioritized. Uncertainty involves the unknown and the unknowable —­ scenar-
                            ios where no amount o ---  data can predict what ­will happen. Trade secret protection
                            requires attention to both. A com­pany might know that its sales algorithm is exposed
                            to a certain type o ---  cybersecurity breach (a risk). But it cannot know ­whether a court
                            ­will  --- ind that algorithm legally protectable i ---  en --- orcement becomes necessary (an
                             uncertainty). Both must be managed, but they require di --- ­ --- er­ent strategies.
                                In the sections that  --- ollow, we ­will show how businesses can approach risk ­analytically
                            and uncertainty qualitatively. We ­will explore how secrets are lost, what kinds o ---  vul-
                            nerabilities ­matter most, and why some threats cannot be ­measured at all. Most o ---

                            all, we ­will emphasize that risk assessment is not a checklist —­ it is a way o ---  thinking.
                            It requires judgment,  --- oresight, and an honest appraisal o ---  how the ­business actually
                            operates. Trade secret protection begins long be --- ore a lawsuit is  --- iled. It begins with a
                            question: What could go wrong, and what would it cost i ---  it did?



                                                  3.2. Understanding Risk and
                                                          Uncertainty
                               Trade secret law assumes that in --- ormation remains secret ­unless a  --- irm allows it
                            to slip. Yet the line between “accidental exposure” and “un --- oreseeable threat” is o --- ten
                            blurred. A trade secret can dis­appear in a moment, through a carelessly  --- orwarded
                            email, a miscon --- igured server, a vendor’s lapse in judgment, or a  --- ormer employee’s
                            quiet conversation at a con --- erence. Sometimes the risk was obvious. Other times, no
                            one could have seen it coming.
                                To protect trade secrets in this environment, businesses must think di ---

erently. They cannot rely solely on compliance checklists, — irewalls, or ­legal — orms. ­Those tools ­matter, but they only work i — the com­pany understands where its in — ormation is most vulnerable and how that vulnerability might mani — est. That ­process is not intuitive. It requires a deliberate — ramework — or analyzing exposure, anticipating threats, and making judgment calls in conditions o — both con — idence and doubt. It also requires an honest reckoning with the limits o —


oresight. This section introduces the analytical — oundation o — trade secret risk strategy. It begins by distinguishing between two closely related but — undamentally di — ­ — er­ent

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 78 1/12/26 2:51 PM 3 • Assessing Risks and Mitigating Vulnerabilities 79

               ideas: risk and uncertainty. Risk re --- ers to situations where outcomes and probabilities
               can be estimated with some degree o ---  con --- idence. Uncertainty, by contrast, re --- ers to
               situations where such probabilities cannot be known at all. Both appear routinely in
               trade secret management. A com­pany might calculate the chance that an employee
               ­will click on a phishing link. But it cannot quanti --- y how a judge ­will interpret a vague
                nondisclosure agreement or ­whether a new competitor ­will act opportunistically i ---  it
                stumbles across unprotected IP.
                   The prob­lem is not that uncertainty exists. The prob­lem is that it is o --- ten ignored.
               ­Legal teams may overestimate their ability to predict judicial outcomes. Engineers may
                place too much trust in encryption. Executives may assume that trade secrets are sa --- e
                ­because no breach has occurred —­ yet. ­These assumptions lull ­organizations into reac-
               tive postures, where trade secrets are protected only ­a --- ter a threat has materialized. By
               then, it is o --- ten too late.
                   To guard against this, trade secret holders must build systems that account  --- or both
               what they know and what they cannot know. They must integrate quantitative models

or estimating risks with qualitative judgment — or navigating uncertainty. ­These are not competing modes o — reasoning. They are complements. A business that only ­measures what it can count ­will miss what it cannot see. A business that relies only on intuition ­will strug­gle to prioritize and allocate resources. The goal is not certainty —­ it is clarity. Clarity about where secrets live, how they might be exposed, and what kinds o — events could disrupt their protection. In the pages that — ollow, we ­will break down risk and uncertainty with precision. We ­will explain why each ­matters, how they di —


er, and what kinds o — reasoning each requires. We ­will then map the speci — ic domains where uncertainty tends to arise—­ ­legal, tech- nological, strategic, and behavioral —­ and show how ­those domains shape the modern landscape o — trade secret vulnerability. Together, ­these — rameworks provide the — ounda- tion — or understanding how trade secrets are lost, how threats should be prioritized, and how decision-­makers can act wisely even when the ­ — uture is unclear.

               3.2.1. De --- ining Risk
                   Risk is o --- ten treated as a vague or generalized threat, but in structured trade secret
               management, it has a speci --- ic meaning. Risk exists when outcomes are uncertain but
               ­measurable. It is the product o ---  two ele­ments: the likelihood that an event ­will occur and
                the magnitude o ---  harm that would  --- ollow. The standard  --- ormulation expresses this as:
                                         Risk = Probability o ---  Event × Magnitude o ---  Harm
                  This ­simple equation provides a power­ --- ul starting point. It allows ­organizations to
               evaluate threats not by intuition but by structured reasoning. A vulnerability that is
               extremely likely but would cause only minor disruption may warrant only modest pro-
               tection. A low-­probability event that could destroy the com­pany’s competitive position
               might demand aggressive sa --- eguards. The  --- ramework provides a language  --- or making
               such trade-­o ---

s explicit.

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 79 1/12/26 2:51 PM 80 3 • Assessing Risks and Mitigating Vulnerabilities

                               Consider a so --- tware  --- irm whose  --- lagship product relies on a proprietary algorithm.
                            The probability o ---  a data breach may be in --- ormed by prior cybersecurity incidents,
                            industry benchmarks, or technical assessments. The magnitude o ---  harm could include
                            not only  --- inancial loss but also reputational damage and diminished investor con --- i-
                            dence. By assigning values —­ quantitative or categorical —­ to t­hese dimensions, the

irm can begin to prioritize risks across its port — olio o — secrets. Structured risk assessment serves multiple purposes. It helps justi — y resource allo- cation. It provides a rationale — or why some secrets receive more protection than ­others. And it o —


ers a way to communicate with ­senior leadership about the trade-­ o —


s between cost, ­convenience, and exposure. Without such a — ramework, protective ­measures may be inconsistent, reactive, or po­liti­cally driven rather than strategic. But even the best risk models rely on assumptions. The accuracy o — a probability estimate depends on the availability and reliability o — data. Magnitude is o — ten easier to approximate in retrospect than in advance. Still, even imper — ect models are valu- able. They shi — t the conversation — rom vague concerns to concrete judgments. They reveal what a com­pany believes about its own exposure and ­whether that belie — is grounded in evidence or hope. In practice, many trade secret threats — all into well-­understood categories. Insider the — t, phishing attacks, lost devices, shared credentials —­ each has a known pattern and a body o — industry data. This makes them amenable to quanti — ication. And ­because they are quanti — iable, they can be ranked, tracked, and monitored over time. What risk assessment cannot do is eliminate judgment. Numbers must be inter- preted. Categories must be de — ined. Models must be updated as the business envi- ronment changes. Still, when built correctly, a structured approach to risk can help ­organizations act be — ore a breach occurs —­ not just respond a — terward.

                            3.2.2. De --- ining Uncertainty
                               Uncertainty is not a  --- uzzier  --- orm o ---  risk. It is a di --- ­ --- er­ent category altogether. Where
                            risk involves probabilities that can be estimated, uncertainty arises when such prob-
                            abilities are unknown or unknowable. It marks the limits o ---  prediction, the boundary
                            where quantitative models lose their grip. For trade secret holders, that boundary is
                            closer than many assume.
                               Uncertainty pervades the l­egal environment in which trade secrets exist. A com­
                            pany may have strong internal controls but cannot know how a judge ­will interpret
                            “reasonable e ---

orts” ­under the De — end Trade Secrets Act. It may disclose con — idential in — ormation ­under an NDA but cannot predict ­whether a jury ­will — ind the agree- ment en — orceable or the disclosure su —


iciently ­limited. The law o — trade secrets is — act-­ intensive, jurisdictionally — ragmented, and o — ten ­shaped by evolving norms. ­There is no algorithm that can assign a reliable probability to a ­ — uture court ruling.

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 80 1/12/26 2:51 PM 3 • Assessing Risks and Mitigating Vulnerabilities 81

                   The same is true in the competitive landscape. A startup might rely on secrecy to
                protect a novel product design, believing that its competitors ­will play by the rules.
                But what i ---  a well-­ --- unded rival disregards the risk o ---  litigation? What i ---  a  --- oreign part-
                ner copies the product, knowing that en --- orcement abroad ­will be slow or in­e ---

ec­tive? ­These are not simply low-­probability events. They are uncertain events —­ unbounded by usable data, driven by strategic be­hav­ior, and subject to externalities that cannot be modeled. Technological uncertainty adds another layer. New tools and plat — orms emerge c­onstantly. T ­oday’s secure system may be tomorrow’s liability. A com­ pany might encrypt its customer analytics with what it believes is a state-­o — -­the-­art proto- col, only to learn that an advance in machine learning makes it pos­si­ble in — er much o — the data — rom metadata alone, or that a new device can scan — or electromagnetic signatures — rom monitors, thus allowing outside actors to reconstruct sensitive visual content. ­These are not science — iction scenarios. Rather, they demonstrate the real­ ity that protection strategies must evolve — aster than traditional l­egal doctrines can respond. ­There is also ­human uncertainty: the internal variables that resist control. ­Will a departing employee honor their obligations? ­Will a j­unior developer share propri- etary knowledge at a meetup? ­Will a man­ag­er, ­under pressure to hit deadlines, autho- rize a risky disclosure to a vendor? ­These questions cannot be answered with statistics. They demand judgment, culture, and — oresight. None o — this means that trade secret protection is — utile. But it does mean that pro- tection cannot rest solely on risk models. In conditions o — uncertainty, decision-­makers must rely on qualitative reasoning. They must use analogy, pattern recognition, and scenario thinking. They must weigh worst-­case outcomes, not just average-­case projec- tions. And they must learn to act even when no clear metric tells them what to expect. Understanding uncertainty is not a retreat — rom rationality. It is an extension o — it. It acknowledges that many impor­tant decisions are made with partial in — ormation, in evolving environments, by actors who are not — ully predictable. In such settings, strategy does not mean calculating the odds. It means preparing — or what cannot be calculated at all.

                3.2.3. Domains o ---  Uncertainty in
                       Trade Secret Strategy
                   Uncertainty is not random noise. It  --- ollows patterns. Although individual outcomes
                cannot be predicted, the sources o ---  unpredictability o --- ten  --- all into recurring catego-
                ries. For trade secret holders,  --- our domains o ---  uncertainty tend to dominate strategic
                decision-­making: entrepreneurial, ­legal, technological, and human-­behavioral. Each
                requires a di --- ­ --- er­ent  --- orm o ---  judgment and a di --- ­ --- er­ent kind o ---  response.

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 81 1/12/26 2:51 PM 82 3 • Assessing Risks and Mitigating Vulnerabilities

                                 3.2.3.1. Entrepreneurial Uncertainty
                               Business conditions change, o --- ten without warning. A com­pany might launch a
                            product ­under the assumption that its pricing algorithm or supply chain method ­will
                            remain valuable  --- or years —­ only to watch a competitor introduce a more e ---

icient model that renders the original advantage obsolete. Markets shi — t. Customer pre — er- ences evolve. New entrants disrupt cost structures or distribution channels. ­These dynamics reshape the value o — a trade secret long be — ore a breach occurs. In — ast-­ moving sectors like so — tware, logistics, and consumer technology, even a well-­guarded secret can become irrelevant i — the strategic assumptions ­behind it no longer hold. Entrepreneurial uncertainty is especially salient — or startups and growth-­stage


irms. ­These ­organizations o — ten rely on secrecy ­because they lack the resources — or patent — ilings or trademark campaigns. But they also — ace a volatile environment in which the most dangerous threat is not necessarily misappropriation but rather that their business model ­will be overtaken be — ore their secret can generate value. In such cases, the most impor­tant strategic question is not how to guard the secret but ­whether the secret is likely to ­matter six months — rom now.

                                 3.2.3.2. Legal Uncertainty
                               Even when companies make serious e ---

orts to protect their secrets, the law may not respond as expected. Courts evaluate trade secret claims through — act-­speci — ic analy­sis that varies by jurisdiction and evolves over time. What one judge considers a “reasonable e —


ort” to maintain secrecy, another may dismiss as inadequate. ­Legal standards are o — ten — ramed in general terms such as “not readily ascertainable” or “deriving value — rom not being known” but applied inconsistently in practice. This unpredictability extends to en — orcement. An NDA may appear airtight ­until a jury — inds it vague or overbroad. A protective order may be granted in one court but denied in another, based on a di — ­ — er­ent reading o — procedural rules. Some ­doctrines, such as inevitable disclosure or threatened misappropriation, remain controversial and unevenly applied. Even i — a com­pany ultimately prevails, delays, appeals, and evidentiary burdens can drain resources and erode the practical value o — success. ­Legal uncertainty is not just about doctrine. It is about institutions. Judges have di — ­ — er­ent levels o — technical sophistication. Courts move at di — ­ — er­ent speeds. Discovery may reveal more than it protects. Strategic decisions about ­whether to sue, ­settle, or stay quiet must account — or ­these variables, even i — they cannot be quanti — ied.

                                 3.2.3.3. Technological Uncertainty
                              No technology remains stable  --- or long. Advances in computation, data analy­sis,
                            connectivity, and surveillance continuously reshape the landscape o ---  trade secret
                            protection. Techniques that ­were once considered secure —­ such as ­simple password

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 82 1/12/26 2:51 PM 3 • Assessing Risks and Mitigating Vulnerabilities 83

                protection, VPN access, or non-­indexed web storage —­ are now widely recognized as
                inadequate. Encryption standards evolve. Collaboration tools change how in --- orma-
                tion is shared. Arti --- icial intelligence opens new ave­nues  --- or reverse engineering and
                pattern detection.
                   ­These developments create uncertainty not only about threats but also about sa --- e-
                guards. ­Will a new plat --- orm introduce vulnerabilities the com­pany has not antici-
                pated? ­Will a patch resolve a weakness or introduce another? ­Will a storage provider’s
                terms o ---  ­service inadvertently authorize broader access than intended? ­These are not
                idle questions. They are daily concerns  --- or companies whose secrets reside in code-
                bases, databases, design  --- iles, and distributed work --- lows.
                   Trade secrets depend on control. Technology, by its nature, disperses control.
                That tension cannot be eliminated, but it must be acknowledged. A robust strategy
                accounts not just  --- or what is known ­today, but  --- or what could change tomorrow.

                    3.2.3.4 Human-­Behavioral Uncertainty
                   Perhaps the most pervasive and least predictable domain o ---  uncertainty is ­human
                be­hav­ior. ­People make ­mistakes. They act in bad  --- aith. They respond to incentives,
                pressures, loyalties, and  --- rustrations that are o --- ten invisible to the ­organizations they
                serve. An engineer may believe they are acting ethically by reusing design ideas at a
                new job. A man­ag­er may bypass protocols ­under deadline pressure. A vendor may
                assume that shared  --- iles are not con --- idential ­unless explic­itly labeled as such.
                   Policies can mitigate ­these risks, but they cannot eliminate them. Contracts can
                establish obligations but cannot guarantee ­per --- ormance. Even good training may not
                overcome distraction, carelessness, or personal ambition. ­Human be­hav­ior does not

ollow the logic o — a spreadsheet. It — ollows emotion, habit, and context. Trade secret strategy must make room — or that real­ity. This domain also includes internal dynamics. Does the ­organization take secrecy seriously? Do man­ag­ers model good be­hav­ior? Are violations treated with appropri- ate consequence? A com­pany’s internal culture is one o — the most power­ — ul predictors o — ­whether its secrecy ­measures ­will succeed. But culture is not a variable that can be programmed. It must be cultivated, sustained, and —­ when necessary —­ corrected.

                                   3.3. Vectors o ---  Loss o ---  Secrecy
                    A trade secret is only protected  --- or as long as it remains secret. That protection can
                be lost in many ways —­ some law --- ul, some unlaw --- ul, and many that  --- all into a gray
                area. Understanding how secrecy is compromised is not just an academic question. It
                is the practical starting point  --- or ­every protection plan. Without a clear view o ---  how
                secrets might be lost, it is impossible to assess risk, prioritize resources, or design
                meaning --- ul sa --- eguards.

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 83 1/12/26 2:51 PM 84 3 • Assessing Risks and Mitigating Vulnerabilities

                               This section  --- ocuses on the concept o ---  loss vectors: the distinct pathways through
                            which a trade secret can lose its protected status. ­These vectors ­matter ­whether the
                            loss comes  --- rom misappropriation, ­mistake, or necessity. They include internal expo-
                            sures, like employee misconduct; external exposures, like vendor leaks; technological
                            vulnerabilities, like unsecured storage; and even law --- ul conduct, like reverse engi-
                            neering or i­ndependent discovery. Each vector poses a di --- ­ --- er­ent kind o ---  threat and
                            calls  --- or a di --- ­ --- er­ent kind o ---  analy­sis.
                                Mapping ­these vectors is a central component o ---  the Trade Secret Protection Plan.
                            It is also essential to understanding real-­world litigation. Many o ---  the most impor­tant
                            trade secret cases hinge on how the in --- ormation was lost. Was the employee bound by
                            a con --- identiality agreement? Did the vendor have access to labeled secrets? Was the
                            technology reverse engineered  --- rom public materials? ­These questions are not always
                            easy to answer. But they begin with a clear sense o ---  what the vectors are.
                               The  --- ollowing subsections provide a detailed  --- ramework  --- or identi --- ying and ana-
                            lyzing loss vectors. They serve both as a conceptual guide and as a checklist  --- or prac-
                            tical application. Each vector is examined not only in terms o ---  what it is but also
                            in terms o ---  why it ­matters and how it tends to arise in business operations. Under-
                            standing ­these pathways is the  --- irst step in designing de --- enses strong enough to keep
                            secrets secret.


                            3.3.1. Insider Threats and Employee Mobility
                               Insiders are o --- ten the most dangerous threat to trade secrets —­ not always ­because
                            they are malicious but ­because they already have access. Employees, executives,
                            interns, and contractors are trusted with sensitive in --- ormation to do their jobs. That
                            trust creates opportunity. When insiders misuse or mishandle con --- idential material,
                            the damage can be swi --- t and irreversible.
                                Some insider threats are deliberate. A departing employee may take  --- iles to a com-
                            petitor, download source code  --- or personal use, or share customer data to impress a
                            new employer. ­Others are the result o ---  carelessness:  --- orwarding con --- idential emails to
                            a personal account, uploading documents to an unsecured cloud ­service, or discuss-
                            ing sensitive proj­ects with  --- riends. In some cases, the risk is not action but inaction:

ailing to delete — iles, return physical materials, or abide by continuing obligations ­a — ter employment ends. Employee mobility compounds this risk. In industries where job switching is — re- quent and teams are built — rom overlapping networks o — pro — essionals, trade secrets o — ten travel with ­people. Even when an employee does not intend to steal anything, their knowledge and habits may re — lect con — idential methods learned at a prior job. This can lead to inadvertent use or disclosure o — protected material that ends up trig- gering ­legal disputes long ­a — ter the employee has moved on. One o — the most prominent insider risk cases arose when a ­senior executive at Bimbo Bakeries prepared to join a competitor while still employed and still accessing

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 84 1/12/26 2:51 PM 3 • Assessing Risks and Mitigating Vulnerabilities 85

                con --- idential in --- ormation. The court allowed an injunction, even be --- ore any misappro-
                priation occurred, based on the risk that the employee’s ­ --- uture work would inevitably
                draw on protected knowledge.



                                            Courts Can Enjoin Threatened
                                                 Misappropriation

                                                  Bimbo Bakeries USA, Inc. v. Botticella
                                                      613 F.3d 102 (3d Cir. 2010)
                     Botticella, a ­senior executive at Bimbo Bakeries, accepted a job with a direct
                     competitor but continued accessing con --- idential  --- iles during his  --- inal weeks.
                     Bimbo sought an injunction be --- ore he le --- t, arguing that Botticella would inevi-
                     tably use Bimbo’s trade secrets in his new role, and the court agreed. Empha-
                     sizing the risk o ---  irreversible harm i ---  Botticella ­were allowed to begin work, it
                     granted a preliminary injunction. The decision turned on his continued access
                     to sensitive in --- ormation, his misleading statements during the transition, and
                     the similarity o ---  the new role to his prior position.



                   In other cases, insider threats become criminal. For example, a  --- ormer Motorola
                employee was caught boarding a  --- light to China with thousands o ---  proprietary docu-
                ments. The com­pany’s internal systems had  --- lagged abnormal download activity, which
                triggered an investigation that led to prosecution ­under the Economic Espionage Act.



                                    System Logs Can Serve as Evidence o ---

                                             Misappropriation

                                                                United States v. Jin
                                                           733 F.3d 718 (7th Cir. 2013)
                     Hanjuan Jin, an engineer at Motorola, was ­stopped at the airport with over
                     a thousand sensitive documents in her luggage. Motorola’s system logs had
                     detected a surge in downloads be --- ore her unannounced departure. Prosecutors
                     charged her ­under the Economic Espionage Act. The court upheld her convic-
                     tion, noting that Motorola had both tracked the activity and taken prompt
                     action. The case highlighted the importance o ---  real-­time monitoring and docu-
                     mented access control in identi --- ying insider misappropriation.



                   Trade secret law does not prohibit ­people  --- rom changing jobs. Nor does it  --- or-
                bid them  --- rom using their general skills and experience. But it does require that

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 85 1/12/26 2:51 PM 86 3 • Assessing Risks and Mitigating Vulnerabilities

                            con --- idential in --- ormation gained ­under conditions o ---  trust remain protected. Courts
                            are o --- ten care --- ul to preserve this balance. In some cases, they have rejected claims
                            based on speculative concerns, recognizing that employees are entitled to pursue new
                            opportunities —­ even with competitors.


                                              “Inevitable Disclosure” Requires More
                                                        Than Job Similarity

                                                               LeJeune v. Coin Acceptors, Inc.
                                                           849 A.2d 451 (Md. Ct. Spec. App. 2004)
                                 Coin Acceptors sued a  --- ormer engineer who le --- t to join a competitor, alleg-
                                 ing that his new role would lead to inevitable disclosure o ---  trade secrets. The
                                 court denied the injunction,  --- inding no evidence that the employee had taken
                                 con --- idential materials or was likely to misuse them. It emphasized that mere
                                 job similarity and prior access ­were insu ---

icient without proo — o — a real threat. The decision rein — orced the princi­ple that employee mobility is not, by itsel — , misappropriation.

                               Companies must there --- ore think critically about how in --- ormation is shared inter-
                            nally. Who needs access to what? Are materials clearly labeled as con --- idential? Are
                            employees trained on what counts as a trade secret and how it must be handled? Are
                            exit interviews used to rein --- orce continuing obligations? The answers to ­these ques-
                            tions determine ­whether a court ­will view the com­pany as having taken reasonable
                            steps to maintain secrecy or as having allowed its secrets to walk out the door.
                               ­Legal disputes over insider threats o --- ten turn on documentation and diligence.
                            Courts want to see policies, training, access controls, and en --- orcement. Without
                            them, even the strongest claim o ---  the --- t may  --- all  --- lat. With them, companies can not
                            only protect their secrets, but also deter misappropriation be --- ore it starts.


                            3.3.2. Vendor and Partner Exposure
                               Trade secrets do not stay locked in a single department or secure  --- a­cil­it­y. They
                            move —­ through contracts, collaborations, shared ­services, and outsourced opera-
                            tions. When companies work with vendors, suppliers, ­consultants, or joint venture
                            partners, they o --- ten share con --- idential in --- ormation to make the relationship  --- unction.
                            That exchange creates opportunity but also exposure.
                               The risk ­here is not always deliberate the --- t. More o --- ten, it is a breakdown in align-
                            ment. A vendor may not realize that a shared schematic is proprietary. A supplier
                            may store con --- idential data on insecure servers. A ­consultant may include propri-
                            etary ­process steps in a ­presentation to another client, believing that they are only

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 86 1/12/26 2:51 PM 3 • Assessing Risks and Mitigating Vulnerabilities 87

                describing industry norms. ­These errors can be just as damaging as outright misap-
                propriation —­ and harder to detect.
                    This prob­lem is compounded when t­here is no direct relationship between the
                originator o ---  the trade secret and the party who ultimately receives it. In --- ormation
                may pass through layers o ---  contractors or intermediaries, none o ---  whom  --- ully under-
                stand the obligations attached. Even when a nondisclosure agreement is in place,
                courts ­will look closely at ­whether it clearly de --- ined what in --- ormation was protected,
                ­whether the receiving party understood ­those bound­aries, and ­whether reasonable
                 e ---

orts ­were made to prevent disclosure. A case — rom the — inancial ­services industry highlights this dynamic. The plainti —


                claimed it shared a proprietary investment concept that ultimately reached the de --- en-
                dant through a chain o ---  intermediaries. But ­because the in --- ormation passed through
                in --- ormal channels and lacked clearly de --- ined con --- identiality obligations, the court
                declined to  --- ind misappropriation.



                         Discloser Must Establish a Duty o ---  Con --- idence

                                            Novus Group, LLC v. Prudential Financial, Inc.
                                              No. 12-­CV-5279 (S.D.N.Y. Apr. 22, 2014)
                     Novus Group alleged that it shared a proprietary  --- inancial product idea with
                     Prudential through a series o ---  intermediaries. The court  --- ound that the plain-
                     ti ---

had not established a direct or su —


iciently clear con — idential relationship between itsel — and the de — endant. ­Because ­there was no evidence that Pruden- tial knew the idea was shared ­under restrictions and no NDA covered the — inal exchange, the court declined to treat the in — ormation as misappropriated. The decision illustrates the di —


iculty o — asserting trade secret rights when in — orma- tion is passed in — ormally or indirectly across multiple parties.

                   The takeaway is not that partnerships are inherently risky but rather that they must
                be structured with clarity. Companies should de --- ine what in --- ormation is con --- iden-
                tial, document who receives it, and monitor how it is used. Con --- identiality agree-
                ments should be tailored, not boilerplate. Just as importantly, t­hose agreements
                should be backed by practical controls —­ ­limited access, version tracking, retention
                ­policies —­ that rein --- orce the ­legal  --- ramework with operational discipline.
                    Trade secret law does not penalize companies  --- or collaborating. But it does expect
                them to take care. When courts assess ­whether in --- ormation was treated as a trade
                secret, they ask not only ­whether it was labeled con --- idential but also ­whether the
                ­owner behaved as though secrecy mattered —­ even when someone ­else was holding
                 the data.

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 87 1/12/26 2:51 PM 88 3 • Assessing Risks and Mitigating Vulnerabilities

                            3.3.3. Cybersecurity and Technical Weak Points
                               Not all trade secret threats come  --- rom ­people. Some come  --- rom systems —­ or  --- rom
                            the  --- ailure to secure them. As more proprietary in --- ormation moves into digital envi-
                            ronments, trade secret exposure increasingly occurs through technical vulnerabili-
                            ties: insecure servers, unencrypted  --- iles, shared credentials,  --- orgotten access points, or
                            miscon --- igured cloud plat --- orms. ­These exposures o --- ten arise without malicious intent.
                            But when they are exploited —­ by competitors, hackers, or even automated tools —­ the
                            result is the same: the secret is lost.
                               Unlike traditional the --- t, technical ex --- iltration may leave no trace. A contractor
                            might access a shared drive  --- rom an unsecured laptop. A  --- ormer employee’s login may
                            remain active ­a --- ter departure. A third-­party ­service may retain copies o ---  uploaded
                            materials even ­a --- ter a proj­ect ends. ­These are not exotic attack vectors. They are ordi-
                            nary oversights. And they can destroy the ­legal  --- oundation o ---  a trade secret by making
                            the in --- ormation “readily ascertainable” to ­others with only minimal e ---

ort. One o — the most striking examples comes — rom a case in the Fi — th Cir­cuit. A tech- nology — irm alleged that its competitor had misappropriated con — idential so — tware by reverse engineering a data trans — er ­process. The de — endant had obtained the so — tware through law — ul means, but the plainti —


claimed that internal technical sa — eguards should have prevented such analy­sis. The case illustrates how courts examine both the l­egal and technical context in assessing ­whether a trade secret was su —


iciently protected.

                                               “Reasonable E ---

orts” O — ten Requires Technical Barriers

                                                           GlobeRanger Corp. v. So --- tware AG USA, Inc.
                                                                  836 F.3d 477 (5th Cir. 2016)
                                 GlobeRanger developed so --- tware  --- or tracking inventory using RFID tags. It
                                 alleged that So --- tware AG misappropriated con --- idential aspects o ---  the sys-
                                 tem ­a --- ter obtaining a copy through a reseller. The court  --- ound that although
                                 So --- tware AG had law --- ully acquired the so --- tware, questions remained about
                                 ­whether reverse engineering ­violated an implied duty o ---  con --- identiality. The
                                  case turned in part on the technical architecture o ---  the system —­ ­whether it
                                  included adequate protections against disassembly and analy­sis. The court
                                  allowed the misappropriation claim to proceed, emphasizing that trade secret
                                  protection depends not only on access restrictions but also on technical barri-
                                  ers to unauthorized use.

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 88 1/12/26 2:51 PM 3 • Assessing Risks and Mitigating Vulnerabilities 89

                   This kind o ---  threat cannot be managed solely through contracts. It requires robust
                in --- ormation security practices: tiered access controls, encryption in transit and at rest,
                device management, network monitoring, o ---

boarding protocols, and — requent audits o — system permissions. It also requires awareness. Many businesses underestimate how much sensitive in — ormation circulates on internal drives, Slack channels, cloud


olders, and mobile devices. The law recognizes that no system is per — ect. But it does expect trade secret ­owners to behave as i — secrecy ­matters. Courts have consistently looked to technical discipline as a signal o — intent: Did the com­pany lock down its most sensitive — iles? Did it restrict access by role? Did it take action when irregular activity was detected? I — the answer is no, even well-­dra — ted NDAs may not be enough to preserve the claim. In a digital world, technical sa — eguards are not optional —­ they are — oundational. They do not replace ­legal protections. They make ­those protections credible.

                3.3.4. Reverse Engineering and Law --- ul
                       Discovery
                   Not all loss o ---  secrecy results  --- rom misconduct. Trade secret law does not protect
                in --- ormation  --- rom being discovered through law --- ul means. I ---  a competitor in­de­pen­
                dently develops the same ­process, analyzes a publicly available product, or reverse
                engineers a commercial device without breaching any duty o ---  con --- identiality, the
                secret is lost —­ and no ­legal remedy applies.
                   This princi­ple distinguishes trade secret law  --- rom other  --- orms o ---  intellectual prop-
                erty. Unlike patents, which grant exclusive rights regardless o ---  i­ndependent inven-
                tion, trade secrets are vulnerable to legitimate discovery. That vulnerability is not a
                loophole. It is a  --- eature o ---  the system. Trade secret protection rewards con --- identiality
                and internal discipline —­ not exclusivity. I ---  another party can  --- igure out the same idea
                without cheating, the law allows them to do so.
                   Reverse engineering is the most impor­tant and most common law --- ul vector o ---

                loss. Courts have long held that a product placed in the marketplace can be analyzed,
                deconstructed, and understood, so long as the analyst does not violate any ­legal obli-
                gation in the ­process. This includes chemical analy­sis, so --- tware disassembly, physical
                inspection, and even behavioral testing.
                   A well-­known case  --- rom the Ninth Cir­cuit illustrates this clearly. A com­pany that
                sold mechanical locks claimed trade secret protection over its key codes. But lock-
                smiths had law --- ully acquired the locks and decoded the system by observing the key
                and lock combinations. The court held that the in --- ormation was no longer protectable
                ­because it had become readily ascertainable by proper means.

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 89 1/12/26 2:51 PM 90 3 • Assessing Risks and Mitigating Vulnerabilities

                                    Law --- ul Reverse Engineering Renders In --- ormation
                                                “Readily Ascertainable”

                                                           Chicago Lock Co. v. Fanberg
                                                           676 F.2d 400 (9th Cir. 1982)
                                 Chicago Lock Co. manu --- actured mechanical locks that used proprietary key
                                 codes. ­Independent locksmiths compiled re --- erence charts o ---  the codes by ana-
                                 lyzing locks obtained in the market. The com­pany sued to stop publication
                                 o ---  the charts, claiming trade secret misappropriation. The court rejected the
                                 claim, holding that the in --- ormation had been acquired through law --- ul reverse
                                 engineering. Once the locks ­were sold, nothing prevented customers or third
                                 parties  --- rom examining them to deduce their internal design.



                               Reverse engineering is not the only law --- ul path to disclosure. Some trade
                            secrets are uncovered through ­independent development. ­Others must be disclosed
                            in regulatory  --- ilings, in contractual negotiations, or  --- or public sa --- ety compliance.
                            While ­legal sa --- eguards can help limit how much is revealed, they cannot always pre-
                            vent loss o ---  secrecy. I ---  disclosure is required, the in --- ormation may lose its protected
                            status ­unless care --- ully managed through redactions, protective ­orders, or parallel IP
                            strategies.
                               The ­legal standard is clear: i ---  a trade secret becomes readily ascertainable by proper
                            means, it ceases to be a trade secret. This places the burden on the ­owner to antici-
                            pate how the in --- ormation might be discovered and to take steps to delay or prevent
                            that discovery where pos­si­ble. Techniques may include product ob --- uscation, modular
                            design, noncompete provisions (where en --- orceable), and care --- ul release sequencing.
                            But in many cases, the only reliable solution is to avoid releasing the secret at all.
                               Trade secret protection is strongest when the in --- ormation stays out o ---  the public
                            eye. Once a product is shipped, reverse engineering is always a possibility. The law ­will
                            not save a com­pany  --- rom exposure it could have prevented.



                            3.3.5. Necessary Disclosure and Operational
                                    Sharing
                                Some trade secrets cannot  --- unction ­unless they are shared. A proprietary manu-

acturing method may need to be disclosed to a third-­party pro­cessor. A customer database may be used by a marketing — irm to run targeted campaigns. A core algo- rithm may be embedded in a product sold to end users. In each case, the in — ormation must be exposed in order to generate value. That exposure creates risk, even when it is operationally necessary and legally authorized.

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 90 1/12/26 2:51 PM 3 • Assessing Risks and Mitigating Vulnerabilities 91

                   The law does not prohibit companies  --- rom sharing trade secrets with employees,
                vendors, or collaborators. But it does require them to do so in a way that maintains
                secrecy. Courts routinely ask ­whether the com­pany took reasonable steps to preserve
                con --- identiality when in --- ormation was distributed. This includes ­legal sa --- eguards, like
                nondisclosure agreements and licensing terms. It also includes technical and proce-
                dural controls, like access restrictions, data labeling, encryption, and audit trails.
                   The more widely a secret is shared, the harder it is to protect. Each disclosure cre-
                ates a new vector  --- or loss —­ not just through malice or error but through misinterpre-
                tation as well. A document marked “con --- idential” may be  --- orwarded to a new team
                member who has not signed an NDA. A subcontractor may assume that shared  --- iles
                are general know-­how. A team in one department may use a ­process they believe to
                be routine, not realizing it was originally protected in --- ormation.
                   Courts are not sympathetic to companies that rely solely on  --- ormalities. They look

or evidence that the business took its secrecy obligations seriously. This includes clar- ity in documentation, care in training, consistency in en — orcement, and restraint in distribution. A secret that is shared indiscriminately —­ without guardrails, tracking, or internal awareness —­ may lose its ­legal protection even i — it was once con — idential. A recent case — rom the District o — Mas­sa­chu­setts illustrates how even well-­ intentioned operational disclosures can undermine trade secret status when sa — e- guards are inadequate.

                               Operational Sharing Without Sa --- eguards
                                      Undermines Trade Secrets

                                                AnywhereCommerce, Inc. v. Ingenico Inc.
                                                  578 F. Supp. 3d 219 (D. Mass. 2022)
                     AnywhereCommerce alleged that a  --- ormer partner misused trade secrets
                     shared during integration work on payment pro­cessing systems. The plainti ---

                     had shared in --- ormation through routine collaboration but  --- ailed to establish
                     that the materials ­were disclosed ­under speci --- ic con --- identiality restrictions. The
                     court  --- ound that although the in --- ormation may have had commercial value,
                     the lack o ---  clear protective ­measures during operational use undermined its
                     trade secret status. The decision emphasized that mere intent to protect is not
                     enough —­ reasonable e ---

orts must be evident in practice.

                   Not ­every trade secret can be locked away. Some must be deployed. Some must be
                licensed. Some must be explained to customers or integrated with third-­party plat-

orms. The challenge is to do so without — or — eiting protection. That requires care — ul planning, disciplined execution, and a clear understanding that necessary disclosure does not mean unprotected disclosure.

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 91 1/12/26 2:51 PM 92 3 • Assessing Risks and Mitigating Vulnerabilities

                               Trade secret law rewards ­those who treat con --- identiality as a continuous obliga-
                            tion, not a one-­time  --- ormality. When sharing is necessary, secrecy must travel with
                            the in --- ormation.



                                     3.4. Strategic Decision-­Making ­Under
                                            Conditions o ---  Uncertainty
                                Trade secret protection is not just a l­egal  --- unction —­ it is a strategic one. While
                            ­lawyers may dra --- t NDAs and engineers may implement access controls, the question
                             o ---  how much to protect, how widely to share, and what risks to accept  --- alls to decision-­
                             makers operating ­under uncertainty. ­These choices are rarely made with per --- ect in --- or-
                             mation. Most o ---  the time, they involve tradeo ---

s, assumptions, and an uncom — ortable blend o — intuition and logic. Traditional risk analy­sis works well when probabilities are known. But trade secret decisions o — ten involve uncertainties that cannot be quanti — ied. Courts may apply unpredictable standards. Competitors may behave opportunistically. Employees may de — ect unexpectedly. Emerging technologies may render current protections obsolete. In ­these environments, companies must rely on strategic reasoning —­ structured tools that support sound judgment even when outcomes are unclear. This section explores several methods that ­organizations use to make decisions ­under uncertainty. ­These are not l­egal doctrines. They are business concepts with direct relevance to trade secret management. Each helps explain how companies can move — orward even when the path ahead is di —


icult to map.

                            3.4.1. Regret Minimization
                               One o ---  the simplest and most power­ --- ul tools  --- or strategic reasoning ­under uncer-
                            tainty is regret minimization. Rather than asking, “What is most likely to happen?”
                            this approach asks, “I ---  I turn out to be wrong, what ­will I regret most?”
                               Applied to trade secrets, this o --- ten leads companies to overprotect high-­value
                            in --- ormation, even when the probability o ---  exposure seems low. I ---  the downside o ---

                            disclosure would be catastrophic —­ loss o ---  a product lead, damage to customer trust,
                            competitive erosion —­ the com­pany may choose aggressive controls not ­because the
                            risk is high but ­because the regret would be severe i ---  the risk materialized.
                               This approach explains why some businesses require dual-­authentication to access
                            sensitive  --- iles, or why they limit visibility even within trusted teams. It is not neces-
                            sarily ­because they expect a breach; rather, it is ­because they could not tolerate the
                            outcome i ---  a breach occurred.

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 92 1/12/26 2:51 PM 3 • Assessing Risks and Mitigating Vulnerabilities 93

                   Regret minimization is especially use --- ul when comparing two imper --- ect options.
                Should a com­pany share a trade secret with a prospective partner be --- ore a deal is

inalized? I — the deal — alls through, ­will the com­pany regret the exposure more than it would regret a delay in negotiations? ­These are strategic choices. The goal is not to eliminate uncertainty —­ but to live with it wisely.

                3.4.2. Option Value and Flexibility
                   Secrecy preserves  --- lexibility. In --- ormation that remains con --- idential gives a com­
                pany the option to patent it l­ater, to license it selectively, or to pivot in response to
                market developments. Once a trade secret is disclosed, even inadvertently, that  --- lex-
                ibility may be lost.
                  This is why many ­organizations treat secrecy itsel ---  as a strategic asset. They delay
                public  --- ilings. They limit disclosures in contract negotiations. They split proj­ects into
                modules to avoid revealing the  --- ull picture to any one outsider. ­These techniques are
                not just about compliance —­ they are about preserving option value.
                   Flexibility ­matters most when ­ --- uture outcomes are uncertain. A com­pany may not
                yet know ­whether it ­will pursue regulatory approval, seek outside investment, or part-
                ner with a larger  --- irm. By limiting exposure now, it retains the  --- reedom to choose ­later.
                This approach borrows  --- rom real-­options thinking in  --- inance: the idea that waiting
                has value when the cost o ---  action is irreversible.
                   Trade secrets are inherently option-­like. They do not guarantee exclusivity, but they
                do allow a  --- irm to keep its strategic hand hidden ­until the time is right. Protecting that
                option —­ through technical, contractual, and procedural means —­ is a core ele­ment o ---

                trade secret strategy.


                3.4.3. Scenario Thinking and Adaptive Planning
                   When probabilities are unclear, one alternative to  --- orecasting is scenario thinking.
                This approach asks decision-­makers to imagine a range o ---  plausible ­ --- utures and to
                plan  --- or how each would a ---

ect the trade secret at issue. What i — a key engineer leaves and joins a competitor? What i — a — oreign jurisdiction re — uses to en — orce the com­pany’s NDA? What i — a regulatory — iling becomes pub- lic despite redactions? Rather than pretending ­these outcomes are unlikely, scenario thinking prepares — or them. It asks: What would we do i — this happened tomorrow? The value o — this method is not in prediction but rather in preparedness. Scenario thinking allows a com­pany to identi — y weak points in its current controls, build con- tingency plans, and assign responsibility be — ore a crisis occurs. It also supports inter- nal alignment: by discussing potential ­ — utures in advance, teams are less likely to panic or blame each other when di —


icult situations arise.

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 93 1/12/26 2:51 PM 94 3 • Assessing Risks and Mitigating Vulnerabilities

                               Adaptive planning builds on this by creating mechanisms  --- or response. For exam-
                            ple, i ---  a competitor releases a product that appears to re --- lect internal know-­how, who
                            investigates? Who determines ­whether to litigate? Who controls messaging to cus-
                            tomers or investors? ­These are not ­legal questions alone —­ they are also strategic ones.
                            And they are best answered be --- ore the pressure hits.


                            3.4.4. ­Legal Uncertainty and Judicial Risk
                               ­Legal uncertainty adds a unique layer o ---  complexity to trade secret decision-­
                            making. A com­pany may take extensive steps to protect its secrets, only to  --- ind that a
                            court views ­those steps as insu ---

icient. Or it may pursue en — orcement, only to see the case dismissed on procedural grounds or ­limited by narrow judicial interpretation. This is not a reason to give up on trade secret protection. But it is a reason to ­ — actor judicial risk into strategic choices. Companies should consider not only what the law says but also how courts have interpreted similar — acts in the past —­ and how long, costly, and public en — orcement might become. ­Legal uncertainty also a —


ects settlement strategy. A business may have a strong claim but choose to resolve a dispute quietly rather than risk unwanted disclosure during litigation. Or it may decline to — ile suit i — the evidentiary burden is too high or the — orum is un — avorable. ­These decisions are not signs o — weakness. They are part o — a mature risk strategy, one that recognizes the di —


erence between being right and being e —


ective.

                            3.4.5. ­Organizational Be­hav­ior and Bias
                               Fi­nally, decision-­making ­under uncertainty is ­shaped not only by in --- ormation but
                            by ­human be­hav­ior as well. ­Organizations tend to overestimate their security, under-
                            estimate adversaries, and discount rare but catastrophic events. ­These cognitive and
                            cultural biases can derail even the most care --- ully designed protection plans.
                              Overcon --- idence is especially dangerous. Teams may believe that their employees
                            would “never do that” or that their contracts are “airtight.” They may dismiss early
                            warning signs or  --- ail to review access logs ­because no incident has occurred. This
                            mindset can blind an ­organization to real vulnerabilities.
                               Group dynamics also ­matter. Risk committees may avoid di ---

icult conversations or de — er to dominant voices. ­Legal and technical teams may operate in silos, — ailing to coordinate their e —


orts. ­These behavioral patterns are rarely vis­i­ble on an org chart, but they shape ­every aspect o — trade secret strategy. The best practices — or protecting trade secrets includes building processes to coun- teract problematic behavioral tendencies.

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 94 1/12/26 2:51 PM 3 • Assessing Risks and Mitigating Vulnerabilities 95

                       • Structure risk reviews:
                          • Hold a standing monthly meeting to identi --- y any new or expired “crown-
                            jewel” trade-secret assets.
                          • Routinely review who has access to con --- idential in --- ormation.
                          • Regularly check vendor/contractor exposure via access logs.
                          • Maintain a simple checklist and sign-o ---

s so each asset has owner(s) and revue date(s). • Summary review results — or executive dashboards (e.g., top 3 risks, priority mitigations chosen, and what will be re-checked next time). • Document assumptions: • Maintain an “assumptions register” that lists each key belie — about access, controls, third-party sa — eguards, and monitoring, the evidence


or it, who owns it, and a review date. • When an assumption proves wrong, note what changed and update controls (e.g., tighten permissions, amend NDAs). • Invite dissent: • Assign a rotating devil’s advocate to argue the — ailure case and record unresolved concerns. • Run what-i — drills such as “red team” or “black hat” exercises that test leakage vectors and mitigation strategies. • Provide a protected escalation channel — or employees to raise access or contract concerns without retaliation (and perhaps anonymously). • Catalog dissenting opinions via a minority note—a brie — paragraph explaining the objection—so it can be revisited later. • Treat risk management as an evolving practice: • Do blameless post-mortems a — ter incidents or near-misses to — ix systems, not assign — ault. • Set simple metrics and cadences: percentage o — assets with “need-to-know” en — orced, NDA coverage o — vendors, time to disable departing users. • Re — resh training annually and re-test controls quarterly; update the Trade Secret Protection Plan when tech, sta —


ing, or vendors change.

                   Best organizational practices treat risk management not as a box-checking exer-
                cise but as an evolving practice that requires judgment, humility, and continuous
                attention. Trade secrets are lost not only through the --- t but also through inattention.
                Strategic decision-making under uncertainty is how companies guard against both.

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 95 1/12/26 2:51 PM 96 3 • Assessing Risks and Mitigating Vulnerabilities

                                               3.5. Mapping and Pro --- iling the
                                                    Threat Environment
                               Understanding risk requires more than knowing what threats exist. It requires a
                            structured picture o ---  who might want access to a trade secret, how they might attempt
                            to get it, and where the ­organization’s de --- enses are most likely to  --- ail. This means
                            mapping the threat environment in practical, not abstract, terms. Just as engineers
                            create diagrams o ---  system architecture, trade secret man­ag­ers must build models o ---

                            exposure —­ models that re --- lect the ­actual  --- low o ---  in --- ormation, the real-­world be­hav­ior
                            o ---  adversaries, and the structure o ---  the ­organization itsel --- .
                               Trade secret law expects ­owners to take reasonable steps to maintain secrecy. But
                            reasonable steps depend on context. A one-­person startup with a single proprietary
                            method ­ --- aces a di --- ­ ---  er­ent environment than a multinational with dozens o ---  overlapping
                            product lines and an extended supply chain. The threats are di --- ­ --- er­ent. The resources
                            are di --- ­ --- er­ent. The expectations are di --- ­ --- er­ent. This section provides a  --- ramework  --- or
                            building a threat model that matches the ­organization’s speci --- ic posture.


                            3.5.1. Adversary Pro --- iling
                               ­Every trade secret threat has a potential actor ­behind it. Sometimes the actor is
                            external: a competitor, a vendor, a state-­backed entity. Other times, it is internal: a
                            disgruntled employee, a careless contractor, a well-­meaning executive ­under pressure.
                            Pro --- iling adversaries means identi --- ying not only who might bene --- it  --- rom misappro-
                            priation but also who has the motive, means, and opportunity to act.
                               Some businesses  --- ace specialized adversaries. A phar­ma­ceu­ti­cal com­pany oper-
                            ating near patent expiration may expect reverse engineering  --- rom generic manu-

acturers. A tech — irm in a competitive hiring market may expect sta —


poaching. A de — ense contractor may expect surveillance by — oreign agents. Pro — iling helps com- panies prioritize which secrets to guard most heavi­ly, and which vectors to monitor most closely. The goal is not to assign blame in advance. It is to develop a realistic understand- ing o — the incentives and capabilities o — ­others. Would a competitor pay — or inside in — ormation? Would a regulator require disclosure that leaks into the public domain? Would a partner com­pany retain access to con — idential — iles ­a — ter a joint proj­ect ends? ­These are questions that shape real risk —­ not hy­po­thet­i­cals, but the speci — ic ways trade secrets may come ­under pressure. Pro — iling also allows ­organizations to consider patterns. Have similar companies experienced leaks in speci — ic jurisdictions? Are competitors investing in technologies that make reverse engineering easier? Are certain vendors working with both the com­pany and its rivals? The answers to ­these questions in — orm both l­egal strategies and operational decisions, such as who gets access to what and ­under what conditions.

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 96 1/12/26 2:51 PM 3 • Assessing Risks and Mitigating Vulnerabilities 97

                3.5.2. Attack Sur --- ace Analy­sis
                   An adversary needs an opening. That opening may be technical, physical, proce-
                dural, or cultural. The set o ---  all such openings is o --- ten re --- erred to as the attack sur --- ace.
                For trade secret protection, the attack sur --- ace includes ­every place a secret is stored,
                shared, or transmitted. It includes servers, devices, notebooks, emails, conversations,
                whiteboards, cloud drives, onboarding materials, and exit interviews. I ---  a trade secret
                can be seen or in --- erred, it can be taken.
                   Mapping the attack sur --- ace begins with the inventory. What secrets exist, and where
                do they live? Who has access? How is that access controlled, logged, or reviewed?
                What policies govern disclosure? What tools monitor compliance? Many companies
                are surprised by how widely their most valuable in --- ormation circulates and how  --- ew
                barriers exist to accessing it.
                   Attack sur --- ace analy­sis also requires understanding indirect exposure. A market-
                ing team may use a proprietary pricing model without knowing how it works. A
                design partner may receive speci --- ications that re --- lect years o ---  con --- idential develop-
                ment. A help desk technician may have access to internal documentation containing
                trade secrets unrelated to their duties. Each o ---  ­these exposures increases the sur --- ace
                area and, there --- ore, the risk.
                    Cultural practices can widen the attack sur --- ace too. I ---  employees routinely share
                screenshots in messaging apps, download  --- iles to personal devices, or use unsanctioned
                collaboration tools, technical controls may o ---

er ­little protection. Trade secret security is only as strong as the system that en — orces it —­ and that system includes be­hav­ior. Attack sur — ace analy­sis does not guarantee prevention. But it enables visibility. It helps companies — ocus protection where it is needed most, limit unnecessary expo- sure, and document the kinds o — reasonable e —


orts courts expect to see when evaluat- ing trade secret claims.

                                3.6. Methods  --- or Assessing Risks
                   Once the ­organization has identi --- ied its trade secrets, understood the nature o ---  risk
                and uncertainty, and mapped its threat environment, the next task is to assess which
                secrets are most at risk and why. This is not a ­matter o ---  intuition or guesswork. It is a
                structured exercise that combines  --- actual analy­sis, operational insight, and reasoned
                judgment.
                   Risk assessment does not produce per --- ect answers. It produces visibility. By artic-
                ulating each trade secret’s likelihood o ---  exposure and how damaging that exposure
                would be, companies can begin to prioritize protections. Some secrets may require
                substantial investment in sa --- eguards. ­Others may pose only minimal risk. The point
                is not to eliminate risk entirely but rather to align protection e ---

orts with ­actual exposure.

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 97 1/12/26 2:51 PM 98 3 • Assessing Risks and Mitigating Vulnerabilities

                               This section outlines three common tools  --- or trade secret risk assessment: vul-
                            nerability audits, risk matrices, and integration with existing enterprise  --- rameworks.
                            Each approach has limitations. But when used together, they provide a practical  --- oun-
                            dation  --- or making de --- ensible, in --- ormed decisions about where and how to protect
                            con --- idential in --- ormation.


                            3.6.1. Vulnerability Audits
                               A vulnerability audit begins with a ­simple premise: the ­organization must know
                            how its trade secrets could be lost be --- ore it can decide how to protect them. The
                            audit ­process identi --- ies weak points in the systems, pro­cesses, and ­people who ­handle
                            sensitive in --- ormation. It evaluates both the existence o ---  protections and their ­actual
                            implementation.
                                The ­process typically starts with access mapping. Who can see each trade secret?
                            Is access ­limited by role? Are logs kept and reviewed? Are permissions updated when
                            team members change proj­ects or leave the com­pany? Many  --- irms  --- ind that theo-
                            retical restrictions are not re --- lected in daily operations. A server may be password-­
                            protected, but the password may be shared among dozens o ---  users. A con --- idential  --- ile
                            may be labeled but stored in a shared  --- older accessible to contractors.
                               The audit then examines disclosure pathways. When is the in --- ormation shared
                            outside the com­pany? Are NDAs signed? Are they speci --- ic to the in --- ormation at
                            issue? Is the in --- ormation labeled, segregated, or protected by technical ­measures? I ---

                            the trade secret appears in a pitch deck, is that deck marked as con --- idential, and is it
                            sent through secure channels?
                               Vulnerability audits also include cultural and procedural review. Are employees
                            trained in trade secret ­handling? Are security practices en --- orced consistently? Is ­there
                            a clear ­process  --- or reporting concerns? Do man­ag­ers rein --- orce or undermine con --- iden-
                            tiality norms? A trade secret is only as secure as the environment in which it is handled.
                               The value o ---  a vulnerability audit lies not in the number o ---

laws it uncovers but in the discipline it instills. It — orces the ­organization to articulate how it protects its most valuable in — ormation —­ and where that protection — alls short. It also creates documen- tation. I — litigation arises, the audit provides evidence that the com­pany took secrecy seriously, even i — not ­every control was per — ect.

                            3.6.2. Risk Matrices
                                A risk matrix translates complex judgments into structured comparisons. It helps
                            ­organizations assess which trade secrets are at greatest risk, based on two dimensions:
                            the likelihood o ---  exposure and the magnitude o ---  harm. ­These assessments may be
                            qualitative or quantitative, but the goal is the same —­ to prioritize threats and allocate
                             resources accordingly.

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 98 1/12/26 2:51 PM 3 • Assessing Risks and Mitigating Vulnerabilities 99

                   A basic matrix divides both axes into three categories: low, medium, and high. A
                trade secret with high likelihood and high harm appears in the upper-­right corner
                o ---  the matrix and demands urgent protection. A secret with low likelihood and low
                harm may warrant only routine sa --- eguards. Secrets that  --- all in between require closer
                scrutiny. Some may be hard to access but extremely valuable. ­Others may be  --- re-
                quently shared but only moderately impor­tant.
                   The matrix does not supply exact answers. It supports deliberation. It helps teams
                articulate why they see a par­tic­u­lar risk as serious or manageable. It sur --- aces disagree-
                ment. It  --- orces speci --- icity. Why is this risk labeled high? What makes that one low?
                What assumptions underlie ­those judgments?
                   Risk matrices also help identi --- y outliers. I ---  a secret is extremely valuable but widely
                accessible, the com­pany may decide to restrict access. I ---  a secret is routinely shared
                but o ---  low strategic value, the com­pany may decide to relax controls. The point is not
                to treat ­every secret the same but rather to match e ---

ort to exposure. Like any model, the matrix depends on input quality. Assessments must be grounded in ­actual work — lows, not abstract — ears. They must re — lect current be­hav­ior, not aspirational policy. But when done rigorously, the matrix provides a de — ensible, transparent basis — or risk classi — ication —­ one that holds up ­under internal review and external scrutiny alike.

                3.6.3. Framework Integration
                   Many companies already maintain enterprise risk management systems that can
                accommodate trade secret protection without building parallel in --- rastructure. These
                systems o --- ten align with international standards  --- rom the International Organiza-
                tion  --- or Standardization (known as “ISO”), such as ISO 31000 (risk management)
                and ISO/IEC 27001 (developed jointly with the International Electrotechnical Com-
                mission  --- or in --- ormation security management), and with United States national

rameworks such as the National Institute o — Standards and Technology (NIST) Cybersecurity Framework. Trade secret protection integrates into these structures by assigning clear ownership o — crown-jewel assets in the risk register, embedding secrecy-speci — ic controls—such as need-to-know access restrictions and vendor/con- tractor due diligence—into existing in — ormation-security protocols, and subjecting trade-secret sa — eguards to the same governance, audit, and assurance cycles already applied to enterprise risk and cybersecurity. ISO 31000 o —


ers a general model — or risk management: establish the context, identi — y risks, analyze their likelihood and impact, implement treatments, and review outcomes. This model — its naturally with trade secret protection. The context is the com­pany’s competitive position. The risks are vectors o — secrecy loss. The treatments are the sa — eguards described in l­ater chapters. The review ­process includes audits, monitoring, and updates to the inventory.

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 99 1/12/26 2:51 PM 100 3 • Assessing Risks and Mitigating Vulnerabilities

                               The NIST Cybersecurity Framework provides more detailed guidance in digital
                            environments. It emphasizes  --- ive  --- unctions: identi --- y, protect, detect, respond, and
                            recover. ­These can be applied directly to trade secrets stored or transmitted electron-
                            ically. Identi --- ication maps what in --- ormation quali --- ies as a trade secret. Protection
                            includes access controls and encryption. Detection involves anomaly tracking and log
                            review. Response and recovery include breach protocols and containment strategies.
                               Integrating trade secret risk into broader systems helps to ensure consistency. It
                            also builds institutional support. When ­legal, technical, and operational teams work

rom the same — ramework, policies are more likely to be implemented, understood, and en — orced. Trade secrets do not sit in a l­egal silo. They exist in code reposito- ries, — actory — loors, design studios, and vendor databases. Protecting them requires a shared language —­ and shared responsibility. Framework integration also supports external validation. When courts, regulators, or investors ask ­whether a com­pany takes trade secret protection seriously, pointing to a systematic, standards-­aligned ­process sends a stronger signal than ad hoc policies. The goal is not compliance — or its own sake. It is coordination, clarity, and credibility.

                                                3.7. The Trade Secret Paradox
                                Trade secret law contains a conceptual puzzle at its core —­ a paradox that distin-
                            guishes it  --- rom ­every other area o ---  intellectual property. Patents are granted by the
                            government. Copyrights arise automatically when an author creates original work.
                            Trademarks protect signs and symbols used in commerce. But trade secrets are di --- ­

er­ent. They are not de — ined by registration or authorship. They are de — ined by secrecy. And yet, secrecy is not a stable category. ­Under the Uni — orm Trade Secrets Act and the De — end Trade Secrets Act, a trade secret is in — ormation that derives ­independent economic value — rom not being generally known and is subject to reasonable e —


orts to maintain its secrecy. This de — inition introduces a — eedback loop: the existence o —

                            l­egal protection depends on the ­owner’s e ---

orts to prevent misappropriation, but ­whether misappropriation occurred depends on ­whether the in — ormation was legally protected in the — irst place. This creates the trade secret paradox: You cannot prove misappropriation ­unless the in — ormation was a trade secret. But you cannot prove something was a trade secret ­unless you can show that you tried to prevent misappropriation. The law protects secrets. But ­whether something is a secret is judged only ­a — ter a breach occurs. The right arises — rom conduct. The violation is de — ined by ­whether that conduct was enough. This circularity is not just theoretical. It de — ines how courts decide cases. When a business sues — or trade secret the — t, the — irst question is not ­whether the de — endant

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 100 1/12/26 2:51 PM 3 • Assessing Risks and Mitigating Vulnerabilities 101

                acted improperly. It is ­whether the in --- ormation was actually a trade secret at the time
                o ---  the alleged the --- t. That depends on  --- acts: Did the com­pany label its documents?
                Limit access? Use NDAs? Train employees? Monitor compliance? Courts ­will not
                assume secrecy. They require proo ---  that the com­pany behaved as though secrecy
                mattered.
                   This means that even wrong --- ul acts —­ taking  --- iles, disclosing documents, using a
                rival’s proprietary ­process —­ may not be considered misappropriation i ---  the plainti ---


ailed to treat the in — ormation as a secret. The legality o — the taker’s conduct is contin- gent on the ­owner’s be­hav­ior. This is the paradox in — ull: Trade secret law does not de — ine a — ixed category o —

                protected in --- ormation. It de --- ines a dynamic relationship between a business and its
                knowledge. The same piece o ---  in --- ormation may or may not be a trade secret depend-
                ing on how it was handled. Secrecy is not a status. It is a  --- unction o ---  e ---

ort. That e —


ort must precede the loss. You cannot retroactively create protection once the in — ormation is gone. Trade secret law protects only what was already being protected. It judges the past, not the intention. The paradox is that l­egal protection exists only i — the ­owner acted in a way that assumed l­egal protection would be needed —­ be — ore knowing that any violation would occur. Trade secrets, in this sense, are per — ormative. They exist ­because the ­owner treats them as i — they exist. And only by treating them that way ­will the law agree.

                                     3.8. Resolving the Circularity
                                                Paradox
                   The circularity at the heart o ---  trade secret law is not a  --- law. It is a  --- eature that
                re --- lects the nature o ---  secrecy itsel --- . Unlike other  --- orms o ---  l­egal protection, which
                begin with registration or authorship, trade secret protection begins with be­hav­ior.
                The law responds not to the content o ---  the in --- ormation but to the way it is treated.
                This makes trade secrets deeply contextual, highly  --- act-­dependent, and inseparable

rom ­organizational conduct. The key to resolving the paradox is to recognize that protection and risk are mutu- ally de — ining. A com­pany’s ­legal ability to stop misappropriation depends on the steps it took to prevent that misappropriation. ­Those steps do not merely support the ­legal claim —­ they are what create the conditions — or the claim to exist. ­Earlier in this chapter, we explored how threats arise — rom both law — ul conduct, such as reverse engineering or ­independent discovery, and unlaw — ul conduct, such as insider the — t or contractual breach. But ­whether a given act — alls into one category or the other depends on ­whether the in — ormation was legally protected as a trade secret. And that, in turn, depends on what the ­owner did to maintain secrecy.

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 101 1/12/26 2:51 PM 102 3 • Assessing Risks and Mitigating Vulnerabilities

                               This is where strategy ­matters. As we saw in Sections 3.4 and 3.6, risk assessment is
                            not just about identi --- ying threats. It is about documenting control. It is about making
                            choices —­ what to protect, how to protect it, and where to draw the line between nec-
                            essary sharing and unacceptable exposure. ­These choices establish the  --- actual  --- ounda-
                            tion  --- or ­legal en --- orceability.
                                The risk matrix is one tool. It helps prioritize which secrets require the strongest
                            controls. The vulnerability audit is another. It exposes gaps between policy and prac-
                            tice. But the real solution to the paradox is behavioral. Courts do not en --- orce rights in
                            the abstract. They en --- orce evidence o ---  care. When a com­pany can show that it treated
                            its in --- ormation as secret —­ not just in policy, but in daily operations —­ it gives the law
                            something to work with.
                               This also explains why so many trade secret claims  --- ail. Plainti ---

s o — ten assume that the wrongdoing speaks — or itsel — . But the law does not begin with the wrongdo- ing. It begins with the question o — ­whether the in — ormation was protected in the — irst place. That protection must be vis­i­ble, consistent, and credible. It must be embodied in NDAs, access logs, labeling practices, training protocols, and audits. It must appear not just in courtroom declarations but also in ordinary routines. In trade secret law, certainty comes not — rom rules but — rom preparation. The circu- larity is resolved when ­organizations treat protection as a continuous act —­ an opera- tional real­ity that gives meaning to the l­egal category. Trade secrets are not de — ined by their value or novelty. They are de — ined by how they are handled. The in — ormation becomes a trade secret ­because the com­pany acted as i — it ­were one and ­because it can prove that it did.

                                              3.9. From Awareness to Action
                               Trade secrets do not protect themselves. They exist only ­because an ­organization
                            acts —­ early, consistently, and deliberately —­ to keep them secret. This chapter has laid
                            out the conceptual and strategic  --- ramework  --- or understanding how trade secrets are
                            lost, how risks are assessed, and why protection begins long be --- ore litigation. It has
                            shown that secrecy is not a state o ---  nature. It is a state o ---  practice.
                               By now, the paradox at the heart o ---  trade secret law should  --- eel less puzzling. ­There
                            is no contradiction in requiring ­owners to prove they protected what they claim was
                            secret. It is not a trap. It is the bargain that de --- ines the entire system: the law ­will
                            en --- orce secrecy, but only i ---  secrecy has already been maintained.
                               This means that risk assessment is not merely a technical exercise. It is the  --- oun-
                            dation o ---  l­egal credibility. ­Every decision —­ what to classi --- y as a trade secret, how to
                            limit access, when to share, and with whom —­ has downstream consequences. ­These
                            decisions determine ­whether the law ­will recognize a violation as misappropriation
                            or dismiss it as  --- air competition.

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 102 1/12/26 2:51 PM 3 • Assessing Risks and Mitigating Vulnerabilities 103

                   Chapters 1 and 2 provided the groundwork: how trade secrets are de --- ined, and
                how they are inventoried and categorized. This chapter has shown how risk enters
                the picture, both as a practical concern and as a condition o ---  en --- orceability. The
                next step is to act on that awareness —­ to build systems that prevent loss, mitigate
                vulnerabilities, and respond to internal and external threats in ways that courts ­will
                recognize and re­spect.
                   Chapter 4 begins with internal risks. It examines the greatest and most common
                source o ---  loss: ­people within the ­organization. Employees, contractors, executives,
                and ­others with authorized access can become the reason a secret no longer quali --- ies
                as a secret. ­Whether through carelessness, misunderstanding, or deliberate breach,
                insiders represent the most direct challenge to any protection plan.
                   But as we ­will see, ­those risks can be addressed. Protection is not an illusion. It is a
                discipline. And it begins by turning awareness into action.



                                                            Re --- erences
                    Frank H. Knight, Risk, Uncertainty and Pro --- it (Houghton Mi ---

lin Co. 1921). Kenneth J. Arrow, Economic Wel — are and the Allocation o — Resources — or Invention, in The Rate and Direction o — Inventive Activity: Economic and Social ­Factors (Nat’l Bureau o — Econ. Research ed., Prince­ton Univ. Press 1962). Edmund W. Kitch, The Nature and Function o — the Patent System, 20 J.L. & Econ. 265 (1977).

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 103 1/12/26 2:51 PM 6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 104 1/12/26 2:51 PM Chapter 4 Mitigating Internal Vulnerabilities

                   No trade secret protection plan can succeed without controlling what happens
                inside the ­organization. Employees, contractors, executives, and advisors all require
                access to sensitive in --- ormation to do their jobs. That access creates vulnerability. And
                while external threats may draw more attention, it is internal exposure that ­causes
                most trade secret loss.
                   Internal vulnerabilities take many  --- orms. A departing executive might join a com-
                petitor and apply proprietary knowledge without ever copying a  --- ile. A j­unior engi-
                neer might  --- orward documents to a personal account  --- or ­convenience, not realizing
                the l­egal consequences. A  --- ormer salesperson might solicit old customers, believing
                that the com­pany’s CRM (or sales database) is just a list, not a protected asset. Even
                well-­intentioned insiders can become inadvertent threats i ---  expectations are unclear
                or protections are inconsistently en --- orced.
                   The law re --- lects this. Courts evaluating trade secret claims routinely ask ­whether
                the com­pany took reasonable ­measures to prevent exposure. That inquiry begins with
                what happens inside the business: the clarity o ---  its contracts, the structure o ---  its access
                controls, the discipline o ---  its training and monitoring, and the credibility o ---  its poli-
                cies. In other words, trade secret status is not just about what the in --- ormation is. It is
                about how the ­organization treats it —­ ­every day, at ­every level.
                  This chapter provides a detailed guide to mitigating internal vulnerabilities. It
                covers:
                       • The use o ---  contractual tools such as nondisclosure agreements,
                           noncompetes, and invention assignment clauses
                       • Operational sa --- eguards, including access limitation, document labeling,
                           and employee monitoring
                       • Behavioral and cultural systems: training, onboarding, and exit protocols
                       •	­Legal doctrines that determine when internal misuse becomes legally
                           actionable misappropriation
                  Throughout, we  --- ocus on the per --- ormative nature o ---  secrecy. Protections must not
                only exist —­ they must be legible to a court as well. They must be consistently applied,

                                                            105

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 105 1/12/26 2:51 PM 106 4 • Mitigating Internal Vulnerabilities

                            well-­documented, and tied to the real­ity o ---  how the ­organization operates. This is espe-
                            cially true in an era o ---  hybrid work, cloud collaboration, mobile devices, and expand-
                            ing vendor networks. The internal environment is  --- luid. So must be the ­organization’s
                            control over it.
                               We use the term vulnerability to capture both risk (which can o --- ten be ­measured)
                            and uncertainty (which cannot). Internal vulnerabilities may be driven by incentives,
                            be­hav­ior, oversight, or ­organizational design. Some are  --- oreseeable. ­Others are not.
                            The point is not to eliminate all possibility o ---  breach. It is to ensure that i ---  one occurs,
                            the com­pany can show that it did every­thing the law expects —­ and more.
                              The sections that  --- ollow provide both doctrinal analy­sis and practical guidance.
                            Breakout boxes o ---

er clause samples and policy language, summarize key en — orce- ment cases, and unpack contested doctrines and compliance pit — alls. The result is not just a ­legal chapter but also a strategic one. It is meant to guide action —­ not just describe consequences.

                                                        4.1. Internal Risk as the
                                                             Primary Threat
                               The most serious threats to trade secrets almost always come  --- rom within. It is
                            not the anonymous hacker or the distant competitor who most o --- ten compromises
                            con --- identiality. It is the employee who has legitimate access, the contractor who mis-
                            understands expectations, the executive who leaves  --- or a rival, or the vendor whose
                            internal controls  --- all short. ­These actors are not strangers to the in --- ormation. They are
                            part o ---  the business. And ­because they operate with authority, trust, and routine expo-
                            sure, they represent the single most impor­tant category o ---  trade secret vulnerability.
                                Courts have long recognized this. The majority o ---  trade secret litigation involves
                            individuals or  --- irms who once had legitimate access to the protected in --- ormation.
                            ­These cases o --- ten arise ­a --- ter a departure or during a transition in roles. Sometimes
                             the breach is overt, as when a departing executive downloads design  --- iles and uses
                             them to launch a competing product. Other times, the harm is more subtle and harder
                             to detect, as when con --- idential know-­how is gradually deployed at a new job in a
                             way that undermines the value o ---  the original secret. In both cases, the ­legal analy­sis
                             begins with a single question: Did the com­pany take reasonable steps to protect the
                             in --- ormation be --- ore the breach occurred?
                               Trade secret protection is backward-­looking. A com­pany cannot declare ­a --- ter the

act that certain in — ormation was valuable and con — idential. It must demonstrate, through contemporaneous conduct, that secrecy was consistently maintained. This conduct includes the use o — contractual restrictions, internal policies, access controls, and employee education. It includes monitoring, documentation, and en — orcement. Most importantly, it includes evidence that the com­pany took secrecy seriously across the ­organization —­ not just at the top or on paper, but in practice.

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 106 1/12/26 2:51 PM 4 • Mitigating Internal Vulnerabilities 107

                   Internal risk is not a narrow category. It includes  --- ull-­time employees, part-­time
                workers, i­ndependent contractors, ­consultants, and executives. It includes interns,
                advisors, board members, and temporary sta ---

. In some cases, it even includes individ- uals outside the — ormal ­organizational structure, such as joint development partners or embedded specialists who are given access to systems or materials — or operational reasons. What unites ­these groups is their proximity to the secret. They do not need to hack a system or circumvent a — irewall. They already have access. ­Because o — this proximity, internal protection requires more than generic poli- cies. It requires calibrated systems that align ­legal obligations with business realities. The protections must match the level o — access and the nature o — the risk. A ­senior developer with visibility into proprietary architecture needs a di — ­ — er­ent set o — controls than a customer ­service representative ­handling routine account inquiries. The key is not to treat every­one the same but rather to design internal sa — eguards that are both credible and proportionate. This chapter begins with contractual mechanisms. ­These include nondisclosure agreements, invention assignment clauses, non-­solicitation terms, and where en — orce- able, noncompetition provisions. It then turns to operational sa — eguards, including access limitation, document management, and monitoring practices. It examines onboarding and training, both as l­egal evidence and as cultural rein — orcement. It addresses what happens when an employee leaves and how courts evaluate post-­ employment risk. And it concludes with en — orcement doctrine, drawing — rom case law to show how courts distinguish credible protection e —


orts — rom mere — ormality. Throughout, the — ocus remains on how companies can anticipate internal vulner- abilities be — ore they become ­legal liabilities. Trade secrets do not depend on any one contract or control. They depend on the system as a ­whole and on the com­pany’s abil- ity to demonstrate that secrecy was built into its structure, not assumed ­a — ter the — act.

                                 4.2. Con --- identiality Agreements
                                   and Contractual Sa --- eguards
                   The  --- irst and most essential method  --- or mitigating internal vulnerability is through
                contract. When companies grant individuals access to trade secrets, they must de --- ine
                that access in ­legal terms. Con --- identiality agreements do not guarantee protection, but
                they do create the  --- ramework  --- or en --- orcing it. They establish duties, clari --- y expecta-
                tions, and provide evidence that the com­pany took deliberate steps to preserve secrecy.
                   Courts evaluating trade secret claims routinely ask ­whether ­there was a contract
                in place, what it said, and ­whether it re --- lected the ­actual  --- low o ---  in --- ormation within
                the business. A well-­dra --- ted agreement shows that the com­pany did not rely on
                trust or routine but rather took the a ---

irmative step o — spelling out what in — ormation was protected, how it was to be used, and what restrictions would remain ­a — ter the

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 107 1/12/26 2:51 PM 108 4 • Mitigating Internal Vulnerabilities

                            relationship ended. When ­these ele­ments are missing or vague, courts are more likely
                            to  --- ind that the trade secret was not adequately protected.
                                This section examines the core l­egal agreements used to control access to trade
                            secrets: nondisclosure agreements, noncompetition and non-­solicitation clauses, and
                            invention assignment provisions. ­These are not one-­size-­ --- its-­all contracts. They serve
                            di --- ­ --- er­ent purposes, raise di --- ­ --- er­ent ­legal issues, and  --- ace di --- ­ --- er­ent standards o ---  en --- orce-
                            ability depending on the jurisdiction and the relationship between the parties. But all
                            serve the same strategic goal: to give the com­pany a legally recognizable  --- oundation

or asserting that its in — ormation was secret and that its secrecy was maintained. The law does not expect companies to use the strongest pos­si­ble restriction in ­every case. It expects them to use the right restriction — or the circumstances. This means tai- loring the scope, duration, and geographic reach o — restrictions to the role o — the person receiving the in — ormation. It also means using language that is precise enough to be en — orceable but is not so rigid that it becomes impractical. Many trade secret disputes turn not on ­whether a contract existed, but on ­whether the terms o — that contract ­were clearly tied to the in — ormation at issue and proportionate to the risks involved. In the subsections that — ollow, we examine each type o — agreement in detail. We review case law illustrating what courts have — ound en — orceable and what they have rejected. We pre­sent sample language, drawn — rom real-­world templates, showing how variations in dra — ting a —


ect l­egal outcomes. And we analyze how ­these agree- ments — it into the broader strategy o — mitigating internal vulnerability —­ not as a sub- stitute — or operational controls but rather as the ­legal anchor that makes ­those controls en — orceable.

                            4.2.1. Core Doctrines in Trade Secret Contracts
                                ­Every internal protection strategy begins with the recognition that ­legal obligations
                            must be clear, en --- orceable, and appropriately matched to the role o ---  the individual
                            receiving access. Trade secret law does not require a written contract in ­every case, but
                            it strongly ­ --- avors the presence o ---  one. Courts routinely cite the existence or absence
                            o ---  con --- identiality agreements as a central ­ --- actor in determining ­whether the ­owner o ---

                            the secret took reasonable steps to maintain secrecy. For employees, contractors, and
                            other insiders, ­these agreements de --- ine the ­legal bound­aries o ---  acceptable conduct.
                                The core contractual doctrines that govern ­these agreements begin with notice.
                            Trade secret protection requires that recipients o ---  con --- idential in --- ormation under-
                            stand that it is con --- idential and that they are not ­ --- ree to use or disclose it beyond the
                            terms o ---  their engagement. A properly dra --- ted agreement provides this notice explic­
                            itly, but it must do more than recite a general obligation o ---  secrecy. It must describe
                            what in --- ormation is protected, ­under what conditions it may be accessed or shared,
                            and what duties survive the end o ---  the relationship.
                               En --- orceability depends on more than the presence o ---  a signature. Courts exam-
                            ine ­whether the contract re --- lects a reasonable balance between the interests o ---  the

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 108 1/12/26 2:51 PM 4 • Mitigating Internal Vulnerabilities 109

                employer and the employee. Moreover, courts are o --- ten constrained by state stat-
                utes that vary signi --- icantly regarding en --- orceability on noncompetes. In some states,
                such as Cali --- ornia, certain clauses, particularly noncompetition provisions, are pre-
                sumptively unen --- orceable. Cali --- ornia’s statute broadly prohibits post-employment
                restraints on law --- ul work, re --- lecting a public policy that  --- avors employee mobility and
                open competition. As o ---  January 1, 2024, Cali --- ornia added Business and Pro --- essions
                Code § 16600.5 (S.B. 699), which renders noncompetes unen --- orceable “regardless o ---

                where and when the contract was signed,” including agreements executed outside
                Cali --- ornia when en --- orcement is sought against Cali --- ornia employees or residents.
                    Other states take the opposite view and routinely uphold noncompetition agree-
                ments so long as they are reasonable in scope and duration. New Hampshire,  --- or
                example, generally en --- orces such agreements when they protect legitimate busi-
                ness interests such as trade secrets, customer goodwill, or specialized training, and
                it requires advance written notice o ---  noncompetes to prospective employees under
                N.H. Rev. Stat. Ann. § 275:70.
                    A  --- ew states have moved toward statutory compromise. Massachusetts’ Non-
                competition Agreement Act, Mass. Gen. Laws ch. 149, § 24L, allows noncompeti-
                tion agreements only i ---  the employer provides garden-leave pay, by de --- ault at least

i — ty percent o — the employee’s highest base salary during the restricted period, or other mutually agreed consideration, and it limits duration to twelve months. Ore- gon’s statute, Or. Rev. Stat. § 653.295, likewise caps noncompetes at twelve months, requires advance written notice, and conditions en — orceability on a minimum sal- ary threshold tied to the state’s median — amily income. I — that threshold is not met, the employer must pay during the restricted period at a de — ined portion o — prior compensation. These approaches illustrate the spectrum o — policy choices, — rom categorical bans to pay- — or-restraint models, through which states balance employer protection against employee — reedom to work. What matters across jurisdictions is whether the agree- ment is tailored to the role, the in — ormation, and the actual business risks involved. Con — identiality agreements also exist within a broader structure o — employment law. An at-­will employee may owe de — ault duties o — loyalty and nondisclosure, but ­those duties are l­imited. Without a contract, ­there is o — ten no surviving obligation once the relationship ends. Similarly, without an invention assignment clause, a com­ pany may — ind that it does not actually own the trade secrets developed by its own employees. In disputes over misappropriation, ­these gaps become liabilities. Courts are reluctant to impose obligations that the com­pany could have required but — ailed to. A common ­mistake in dra — ting trade secret contracts is to use language that is ­either too broad or too vague. Agreements that purport to cover all in — ormation o — any kind or that impose sweeping restrictions without any re — erence to role or duration are — requently narrowed or struck down. Precision is essential. The agreement must link the duty o — secrecy to the ­actual in — ormation at issue, describe how that in — orma- tion is conveyed or used, and identi — y how long the obligation is intended to last.

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 109 1/12/26 2:51 PM 110 4 • Mitigating Internal Vulnerabilities

                                 Ultimately, ­these contracts serve two purposes. They establish rights that can be
                            en --- orced in court, and they signal to employees and ­others that the com­pany treats
                            its in --- ormation as a protected asset. They are not the only ele­ment in determining
                            ­whether something quali --- ies as a trade secret, but they are o --- ten the  --- irst place a court
                             ­will look. In the next sections, we examine the di --- ­ --- er­ent types o ---  contractual sa --- e-
                              guards in detail, beginning with nondisclosure agreements and continuing through
                              more complex restrictions on use, competition, solicitation, and intellectual property.


                            4.2.2. Nondisclosure Agreements
                               A nondisclosure agreement is the  --- oundational instrument o ---  trade secret protec-
                            tion. It creates the  --- irst and most explicit layer o ---  ­legal obligation between a com­pany
                            and anyone who receives access to con --- idential in --- ormation. Courts routinely look to
                            the language o ---  the NDA to determine ­whether the com­pany took reasonable steps to
                            maintain secrecy, ­whether the in --- ormation was adequately identi --- ied as con --- idential,
                            and ­whether the parties understood the terms o ---  use and the consequences o ---  breach.
                               Not all NDAs are en --- orceable. Many are dra --- ted with language so broad or vague
                            that courts decline to give them weight. Some de --- ine con --- idential in --- ormation in
                            terms so expansive that they include public knowledge, personal experience, or gen-
                            eral observations. ­Others  --- ail to state what uses are permitted, how long the obliga-
                            tion lasts, or what disclosures are allowed in compliance with law. Some rely on  --- orm
                            templates that do not align with the ­actual nature o ---  the business relationship.
                                At its core, a well-­dra --- ted NDA must identi --- y what counts as con --- idential, how the
                            in --- ormation ­will be used, to whom it may be disclosed, and  --- or how long the obliga-
                            tion o ---  secrecy ­will continue. It must match the terms to the  --- acts. An agreement that
                            is intended to cover trade secrets must re --- lect that goal in both scope and structure.
                            This means de --- ining the “purpose” o ---  the disclosure, limiting use to that purpose, and
                            prohibiting reverse engineering, i­ndependent application, or derivative use. It also
                            means speci --- ying ­whether oral disclosures are covered, how in --- ormation must be
                            labeled, and what happens when the relationship ends.
                                Many companies, especially t­hose serving as disclosing parties,  --- ­avor unilateral
                            NDAs that protect only their in --- ormation. ­Others use mutual NDAs where both sides
                            ­will share in --- ormation. The choice should re --- lect the  --- low o ---  risk. In ­either case, the
                             agreement must de --- ine its terms in a way that allows  --- or en --- orcement. Courts ­will look
                             closely at ­whether the de --- inition o ---  “con --- idential in --- ormation” includes only marked
                             materials or also covers in --- ormation that should be understood as con --- idential based
                             on context. They ­will ask ­whether the duration o ---  obligation is reasonable, ­whether
                             return or destruction provisions are triggered automatically, and ­whether the receiv-
                             ing party can delegate access to a ---

iliates or third parties. The most de — ensible NDAs use layered de — initions and cascading protections. They de — ine “con — idential in — ormation” with both objective and contextual terms, include illustrative categories, and require the receiving party to exercise at least a reasonable

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 110 1/12/26 2:51 PM 4 • Mitigating Internal Vulnerabilities 111

                degree o ---  care —­ i ---  not the same care used to protect its own in --- ormation. They also
                speci --- y that trade secrets must remain protected in­de --- ­initely, even i ---  other in --- orma-
                tion becomes subject to a time limit. Many include standard language con --- irming the
                disclosing party’s owner­ship rights and disavowing any grant o ---  license or use beyond
                the stated purpose.
                   An NDA is not a l­egal substitute  --- or operational trade secret protection. But it is
                o --- ten the clearest signal to a court that the com­pany understood what was at stake.
                When paired with operational controls and consistent en --- orcement, it becomes
                one o ---  the strongest  --- orms o ---  documentary evidence that secrecy was both real and
                reasonable.
                   The clauses below illustrate how contract language changes depending on ­whether
                the com­pany is in the stronger bargaining position. The  --- irst version is written  --- or
                a disclosing party seeking maximum protection. The second is written  --- or a receiv-
                ing party seeking  --- lexibility and clarity. Each version re --- lects real language used in
                practice.



                                        Con --- idential In --- ormation Clause

                                                            Pro-­Disclosing Party
                     “Con --- idential In --- ormation” means all nonpublic in --- ormation disclosed by the
                     Disclosing Party, directly or indirectly, in written, oral, electronic, visual, or
                     any other  --- orm, that the Receiving Party knows or reasonably should know
                     is con --- idential based on the nature o ---  the in --- ormation or the circumstances
                     surrounding its disclosure. Con --- idential In --- ormation includes, without limi-
                     tation, technical data, trade secrets, know-­how, product designs, marketing
                     plans, business models,  --- inancial data, internal policies, customer and supplier
                     in --- ormation, employee data, pricing strategies, and any analy­sis, compilations,
                     or summaries derived  --- rom such in --- ormation.
                         The Receiving Party agrees to use the Con --- idential In --- ormation solely  --- or the
                     purpose o ---  evaluating or pursuing a business relationship with the Disclosing
                     Party, to restrict disclosure to ­those employees and agents who have a need to
                     know and are bound by obligations o ---  con --- identiality no less protective than
                     ­those set  --- orth herein, and to protect the Con --- idential In --- ormation with the
                      same degree o ---  care used to protect its own con --- idential in --- ormation, but in no
                      event less than a reasonable degree o ---  care. The Receiving Party ­shall not reverse
                      engineer, decompile, or other­wise attempt to derive the under­lying materials

rom any Con — idential In — ormation and ­shall return or destroy all Con — idential In — ormation upon request or upon termination o — the relationship. This Agreement ­shall continue in e —


ect with re­spect to any Con — idential In — ormation — or a period o — two years — rom the date o — disclosure, except that

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 111 1/12/26 2:51 PM 112 4 • Mitigating Internal Vulnerabilities

                                 the Receiving Party’s obligations with re­spect to any trade secret ­shall survive
                                 so long as the in --- ormation remains a trade secret ­under applicable law.



                               In general, the clause’s dra --- ter should dra --- t it  --- avorably to their own side. When
                            a party  --- requently receives in --- ormation —­ such as an inventor-­support hotline or a
                            venture-­capital  --- irm —­ that party may dra --- t the NDA in a narrower manner.


                                                    Con --- idential In --- ormation Clause

                                                              Pro-­Receiving Party
                                 “Con --- idential In --- ormation” means only such in --- ormation that is marked in
                                 writing as con --- idential at the time o ---  disclosure, or, i ---  disclosed orally, is desig-
                                 nated as con --- idential in writing within ten (10) business days therea --- ter. Con-

idential In — ormation ­shall not include any in — ormation that (a) was known to the Receiving Party without restriction be — ore disclosure, (b) becomes publicly available through no — ault o — the Receiving Party, (c) is law — ully obtained — rom a third party without a duty o — con — idential- ity, or (d) is in­de­pen­dently developed by the Receiving Party without re — erence to the Disclosing Party’s in — ormation. The Receiving Party agrees to use the Con — idential In — ormation solely — or the purpose expressly identi — ied in this Agreement and not — or any other purpose. The Receiving Party ­shall protect the Con — idential In — ormation using reason- able care, but no greater than the care it uses to protect its own in — ormation o —

                                 similar sensitivity. The Receiving Party ­shall not be liable  --- or accidental disclo-
                                 sure so long as it acted in good  --- aith and promptly noti --- ies the Disclosing Party
                                 o ---  any unauthorized use.
                                   ­Unless other­wise stated in writing, the con --- identiality obligations ­under this
                                 Agreement ­shall expire one year ­a --- ter the date o ---  disclosure.



                               ­These clauses di ---

er in both structure and e —


ect. The pro-­disclosing party ver- sion uses broad, layered de — initions and extends obligations — or the duration o — trade secret protection. It avoids requiring written markings and prohibits reverse engi- neering. It seeks maximum control, including a return or destruction requirement and explicit limits on internal disclosure. The pro-­receiving party version narrows the scope signi — icantly. It limits con — identiality to marked or memorialized in — or- mation, excludes in­de­pen­dently known or developed content, sets a — ixed dura- tion, and disclaims liability — or good-­ — aith ­mistakes. ­These distinctions are not just

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 112 1/12/26 2:51 PM 4 • Mitigating Internal Vulnerabilities 113

                semantic. They determine what rights survive in a dispute, what obligations a court
                ­will en --- orce, and how likely it is that the com­pany ­will be able to assert a trade secret
                 claim i ---  a breakdown occurs.
                   When dra --- ting NDAs, ­lawyers must understand not only what language is standard
                but also what language shi --- ts risk. ­Whether representing the disclosing or receiving
                party, the objective is the same: to de --- ine the relationship clearly, allocate responsibil-
                ity  --- airly, and anticipate how the agreement ­will  --- unction i ---  something goes wrong.


                4.2.3. Non-­Solicitation and Noncompetition
                       Agreements
                   Restrictions on solicitation and competition are among the most contentious and
                heavi­ly litigated clauses in employment agreements. For companies, they are essential
                tools to prevent insiders  --- rom departing and immediately undermining the com­pany’s
                competitive position. For employees, they can  --- eel like career-­limiting restraints that
                persist long ­a --- ter the relationship ends. Trade secret law does not require ­these clauses,
                but where they are en --- orceable, they can serve as a power­ --- ul supplement to traditional
                con --- identiality agreements. They restrict the use o ---  in --- ormation not by limiting access
                but instead by limiting action.
                   Courts approach t­hese clauses with caution. Unlike NDAs, which are usually
                en --- orced as written ­unless unreasonably vague, non-­solicitation and noncompetition
                clauses are scrutinized  --- or scope, duration, geographic reach, and the nature o ---  the
                employer’s legitimate business interest. They are typically en --- orced only to the extent
                that they are necessary to protect customer relationships, employee stability, or the
                misuse o ---  con --- idential in --- ormation. I ---  the restriction goes  --- urther than necessary to
                serve ­those goals, it may be struck down in ­whole or in part. In some jurisdictions,
                such as Cali --- ornia, certain types o ---  restrictions are unen --- orceable by statute regardless
                o ---  the employer’s interests.
                   A non-­solicitation clause prohibits a  --- ormer employee  --- rom soliciting clients, cus-
                tomers, or employees  --- or a competing business. A noncompetition clause goes  --- ur-
                ther, barring the individual  --- rom working  --- or or establishing a competing business
                altogether. Some agreements include narrow job-­speci --- ic restrictions; ­others attempt
                to bar entire categories o ---  work across wide geographic regions. The broader the
                clause, the more likely it is to be challenged.
                    The en --- orceability o ---  ­these restrictions depends not only on the wording o ---  the
                clause but also on the justi --- ication o ---

ered — or it. Courts ask what interest the employer is trying to protect, why that interest cannot be protected through less restrictive means, and ­whether the employee’s new role actually implicates ­those interests. They also consider ­whether the restriction is necessary to protect trade secrets speci — ically or ­whether it is being used to limit ordinary market competition. The — ollowing clause re — lects a pro-­employer approach. It includes a two-­year dura- tion, prohibits both direct and indirect solicitation, and applies to both customers and

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 113 1/12/26 2:51 PM 114 4 • Mitigating Internal Vulnerabilities

                            employees. It is care --- ully worded to  --- ocus on relationships developed during the term
                            o ---  employment, which increases its likelihood o ---  en --- orcement.



                                      Customer and Employee Non-­S olicitation Clause

                                                            Pro-­Employer Language
                                 The Employee agrees that  --- or a period o ---  two (2) years  --- ollowing the termi-
                                 nation o ---  employment  --- or any reason, the Employee s­hall not, directly or
                                 indirectly, solicit, induce, or attempt to induce any employee, contractor, or
                                 ­consultant o ---  the Com­pany to terminate their relationship with the Com­pany.
                                   The Employee  --- urther agrees that,  --- or the same period, the Employee ­shall not
                                   solicit or attempt to solicit,  --- or the purpose o ---  o ---

ering competing products or ­services, any customer or prospective customer o — the Com­pany with whom the Employee had material contact during the twelve (12) months preceding the termination o — employment. This restriction ­shall apply regardless o — ­whether the solicitation is initi- ated by the Employee, the — ormer colleague, or the customer, and regardless o —

                                 ­whether such conduct is undertaken on behal ---  o ---  the Employee individually or
                                  through another business or entity.



                               This clause illustrates how a well-­dra --- ted non-­solicitation provision can be targeted
                            without being timid. It ties the restriction to speci --- ic relationships, includes a clear
                            time  --- rame, and avoids language that could be seen as punitive or vague. Courts are
                            more likely to en --- orce clauses that are narrowly tailored in this way.
                               By contrast, the next clause re --- lects a pro-­employee dra --- ting perspective. It limits
                            the scope o ---  restriction, carves out general advertising and passive receipt o ---  business,
                            and excludes  --- ormer customers who initiate contact without solicitation. It also caps
                            the restriction at one year and applies only where trade secrets are implicated.



                                      Customer and Employee Non-­S olicitation Clause

                                                            Pro-­Employee Language
                                 The Employee agrees that  --- or a period o ---  one (1) year  --- ollowing the termination
                                 o ---  employment, the Employee ­will not actively solicit business  --- rom any client
                                 o ---  the Com­pany with whom the Employee had direct contact and con --- idential
                                 commercial dealings during the last six (6) months o ---  employment, but only
                                 to the extent that such solicitation would involve the use or disclosure o ---  the
                                 Com­pany’s trade secrets or other con --- idential in --- ormation.

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 114 1/12/26 2:51 PM 4 • Mitigating Internal Vulnerabilities 115

                        Nothing in this clause ­shall prevent the Employee  --- rom engaging in gen-
                     eral advertising not targeted at speci --- ic clients or  --- rom accepting unsolicited
                     business initiated by a  --- ormer customer without any active encouragement
                     or inducement. This restriction ­shall not apply to customers with whom the
                     Employee had a pre-­existing relationship ­independent o ---  their employment.



                   This language re --- lects a more ­limited view o ---  post-­employment obligations. It nar-
                rows the scope o ---  restriction to situations where ­actual misuse o ---  con --- idential in --- or-
                mation is likely, and it explic­itly preserves the employee’s ability to compete on  --- air
                terms. Courts o --- ten  --- ­avor this kind o ---

raming when evaluating ­whether a restric- tion is reasonably calculated to protect a legitimate business interest or ­whether it is designed simply to restrain competition. The strategic choice between t­hese approaches depends on many — ­actors: the se­niority o — the employee, the nature o — the in — ormation at issue, the competitive dynamics o — the industry, and the jurisdiction in which en — orcement would occur. Companies seeking to protect trade secrets through contract must consider not only what protections are desirable but also what a court ­will uphold. Likewise, employ- ees and their counsel must evaluate what they are agreeing to give up and ­whether the clause appropriately balances the employer’s interests with the employee’s — ree- dom to work. Well-­cra — ted restrictions on solicitation and competition can reduce the risk that trade secrets ­will walk out the door and be immediately deployed by a rival. But over- reaching language can back — ire by rendering the clause unen — orceable and undermin- ing the com­pany’s credibility in court. The goal is not to prevent all post-­employment activity. It is to prevent misuse o — protected in — ormation by ­those who once had privi- leged access to it.

                4.2.4. Assignment o ---  Inventions and IP Rights
                   Companies o --- ten assume that they automatically own the intellectual property
                created by their employees. In many cases, that assumption is wrong. ­Under de --- ault
                rules, the creator o ---  an invention, work o ---  authorship, or proprietary method retains
                owner­ship ­unless a contract clearly assigns it to the employer. This is true even when
                the invention is developed on com­pany time or using com­pany resources. As a result,
                the absence o ---  an e ---

ective invention assignment agreement can create substantial risk, particularly when trade secrets are developed internally. Invention assignment clauses serve two — unctions. First, they trans — er owner­ship o — innovations, developments, and other intellectual property — rom the individual to the com­pany. Second, they rein — orce the com­pany’s control over related trade secrets by establishing that in — ormation developed during the course o — employment is not merely con — idential —­ rather, it is owned by the business. This distinction ­matters.

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 115 1/12/26 2:51 PM 116 4 • Mitigating Internal Vulnerabilities

                            Owner­ship strengthens the argument that the com­pany took reasonable steps to pro-
                            tect the in --- ormation and has standing to assert ­legal rights over it.
                               En --- orceability depends on scope. Clauses that purport to assign all ideas or inven-
                            tions conceived by the employee, regardless o ---  ­whether they relate to the com­pany’s
                            business, are o --- ten struck down as overbroad. Many states restrict an employer’s abil-
                            ity to claim inventions developed entirely on an employee’s own time and without
                            use o ---  com­pany resources. Cali --- ornia,  --- or example, requires employers to exclude
                            such inventions  --- rom the scope o ---  assignment and to provide notice o ---  that exclusion.
                            Other states allow broader assignment but still require a clear connection between the
                            work and the employer’s line o ---  business.
                               From the com­pany’s perspective, the goal is to ensure that valuable innovation,
                            including trade secrets, becomes part o ---  the  --- irm’s intellectual property port --- olio. From
                            the employee’s perspective, the concern is o --- ten overreach —­  --- or example, ­whether the
                            clause captures work done outside the scope o ---  employment or imposes obligations
                            that persist long ­a --- ter the relationship ends. ­These tensions can be addressed through
                            care --- ul dra --- ting that links the assignment to speci --- ic roles, proj­ects, and business  --- unc-
                            tions, and that limits its reach to what is reasonably necessary to protect the com­
                            pany’s interests.
                               The clauses below re --- lect ­these competing approaches. The  --- irst version is written
                            to maximize employer owner­ship. The second includes carveouts and clari --- ying limi-
                            tations designed to preserve the employee’s ­independent creative work.



                                                        Invention Assignment Clause

                                                            Pro-­Employer Language
                                 The Employee agrees that all inventions, discoveries, improvements, pro­
                                 cesses, designs, developments, ideas, trade secrets, and other works o ---  author-
                                 ship (collectively, “Inventions”) conceived, developed, or reduced to practice
                                 by the Employee, alone or with ­others, during the term o ---  employment, and
                                 that relate in any manner to the Com­pany’s business, operations, research, or
                                 anticipated work, ­shall be the sole and exclusive property o ---  the Com­pany. The
                                 Employee hereby assigns to the Com­pany all right, title, and interest in and to
                                 such Inventions, ­whether or not patentable or registrable, and agrees to execute
                                 all documents necessary to con --- irm such owner­ship.
                                    This obligation applies regardless o ---  ­whether the Invention was developed
                                 during working hours or using Com­pany equipment, and ­shall survive the
                                 termination o ---  employment.

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 116 1/12/26 2:51 PM 4 • Mitigating Internal Vulnerabilities 117

                   This clause ­ --- avors the employer by using expansive but business-­tethered language.
                It captures all developments related to the com­pany’s  --- ield, regardless o ---  when or
                where they ­were made, and secures both patent and trade secret rights without limi-
                tation. Courts are more likely to en --- orce such a clause when the employee’s role is
                technical or innovation-­oriented, and when the connection to the com­pany’s work is
                direct and provable.



                                            Invention Assignment Clause

                                                        Pro-­Employee Language
                     The Employee agrees to assign to the Com­pany any invention, discovery, or
                     work o ---  authorship that is conceived or developed by the Employee during the
                     course o ---  employment and that ­either
                         (a) results  --- rom any work per --- ormed  --- or the Com­pany, or
                         (b) uses the Com­pany’s time, equipment, supplies, or proprietary in --- orma-
                             tion. This assignment does not apply to any invention that
                                  (i) was developed entirely on the Employee’s own time,
                                 (ii) does not relate to the Com­pany’s business or anticipated research,
                                      and
                                (iii) was created without use o ---  Com­pany resources. Nothing in this
                                      clause ­shall be construed to require the Employee to assign rights
                                      in personal proj­ects or unrelated creative work.
                     The Com­pany agrees to provide advance written notice o ---  the scope o ---  any
                     assignment obligation imposed on work created outside the scope o ---  regular
                     duties.



                   This version narrows the employer’s claim while preserving core protection. It mir-
                rors statutory carveouts in jurisdictions like Cali --- ornia and creates a presumption that
                unrelated or personal work remains with the employee. It also provides transparency
                and avoids ambiguity about the scope o ---  the assignment.
                    Invention assignment clauses are essential to the integrity o ---  a trade secret protec-
                tion plan. Without clear owner­ship, it becomes di ---

icult to argue that a given ­process or method belongs to the com­pany, or that a departing employee had no right to use it. But overreach invites litigation and can weaken the com­pany’s position. Preci- sion, balance, and relevance are what make ­these clauses work, not just strength o —

                language.

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 117 1/12/26 2:51 PM 118 4 • Mitigating Internal Vulnerabilities

                                                  4.3. Judicial En --- orcement o ---

                                                     Restrictive Covenants
                                The strength o ---  a restrictive covenant lies not in how  --- irmly it is written but rather
                            in ­whether a court is willing to en --- orce it. Nondisclosure agreements, noncompeti-
                            tion clauses, non-­solicitation provisions, and invention assignment agreements each
                            create obligations that exist only to the extent that courts give them ­legal e ---

ect. What ­matters is not just what the contract says but also how it — unctions when tested. Trade secret protection depends on this en — orceability. I — a com­pany cannot show that it used en — orceable covenants to limit misuse, it may be unable to prove that it took reasonable steps to maintain secrecy at all. Courts do not en — orce ­these clauses re — lexively. They scrutinize them. The premise o — en — orceability is that the clause is reasonable, proportionate, and tied to a legitimate business interest. Employers cannot use contract to suppress ordinary competition, restrict employee mobility beyond necessity, or claim owner­ship over in — ormation and relationships that are not directly related to trade secrets. But when the clause is well-­dra — ted, well-­matched to the role, and consistently en — orced, courts may treat it as central evidence that the com­pany viewed its in — ormation as secret —­ and treated it accordingly. The cases that — ollow show how ­these doctrines are applied in practice. Each illus- trates how a court evaluated the text o — the agreement, the be­hav­ior o — the parties, and the connection between the clause and the in — ormation at issue. ­These cases are not simply about contract. They are about credibility: ­whether the com­pany had a real plan — or protecting its secrets and ­whether the agreement supported that plan or merely gestured at it.

                            4.3.1. En --- orcement o ---  Nondisclosure
                                    Agreements
                               Nondisclosure agreements are among the most  --- requently litigated  --- orms o ---  restric-
                            tive covenant. While they are generally  --- avored by courts, they are not automatically
                            en --- orceable. Their e ---

ectiveness depends on the speci — icity o — the language, the con- text in which the agreement was executed, and the be­hav­ior o — the parties during the relationship. Courts examine ­whether the NDA clearly de — ined what in — ormation was con — idential, ­whether that in — ormation was actually protected in practice, and ­whether the use or disclosure that — ollowed constituted a breach. In one early and in — luential case, the Seventh Cir­cuit rejected a claim o — misap- propriation where the plainti —


relied on vague con — identiality language and — ailed to mark documents or limit access.

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 118 1/12/26 2:51 PM 4 • Mitigating Internal Vulnerabilities 119

                              Disclosers Must Practice the Protections
                                         Their NDAs Require

                                                            nClosures Inc. v. Block & Co.
                                                            770 F.3d 598 (7th Cir. 2014)
                     nClosures designed custom metal cases  --- or tablets and shared product drawings
                     with a prospective manu --- acturing partner. The drawings ­were not marked as
                     con --- idential, and no NDA was signed. When the partner ­later released a com-
                     peting product, nClosures sued  --- or trade secret misappropriation. The court

ound that nClosures had not taken reasonable steps to maintain secrecy. The absence o — con — identiality markings, coupled with the lack o — access restrictions or — ormal contractual protections, de — eated the claim. The court emphasized that trade secret protection requires more than hope —­ it requires structure.

                   By contrast, in a more recent decision  --- rom Cali --- ornia, the court upheld a nondis-
                closure agreement that included speci --- ic de --- initions and was accompanied by consis-
                tent security practices, even though the de --- endant argued that the in --- ormation was
                not truly secret.



                                     Following NDA Protocols Supports
                                            Trade Secret Claims

                                            BladeRoom Group Ltd. v. Emerson Electric Co.
                                                331 F. Supp. 3d 977 (N.D. Cal. 2018)
                     BladeRoom developed modular data-­center technology and disclosed key
                     design and ­process in --- ormation ­under a detailed NDA during acquisition dis-
                     cussions. ­A --- ter negotiations  --- ailed, Emerson won a contract using a strikingly
                     similar design. BladeRoom sued  --- or trade secret misappropriation. The court
                     allowed the claim to proceed, emphasizing the NDA’s speci --- icity, the care taken
                     to limit access, and the com­pany’s internal practices  --- or labeling and segregat-
                     ing con --- idential in --- ormation. The case shows how a well-­executed NDA that is
                     tied to real-­world be­hav­ior can support a broader en --- orcement strategy.



                   Courts are especially cautious about NDAs that rely solely on boilerplate language
                or that purport to treat all in --- ormation as con --- idential. In a Delaware case involving a
                so --- tware startup, the court declined to en --- orce an NDA where the scope was so broad
                that it became  --- unctionally meaningless.

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 119 1/12/26 2:51 PM 120 4 • Mitigating Internal Vulnerabilities

                                                   Overbroad NDAs Undermine Trade
                                                           Secret Claims

                                         ­Great Hill Equity Partners IV, LP v. SIG Growth Equity Fund I, LLLP
                                                   2020 Del. Ch. LEXIS 76 (Del. Ch. Feb. 27, 2020)
                                 In a dispute  --- ollowing the acquisition o ---  a tech com­pany, the buyer claimed
                                 that the seller’s use o ---  business in --- ormation ­violated the NDA. The agreement
                                 de --- ined “con --- idential in --- ormation” to include virtually all com­pany data, regard-
                                 less o ---  ­whether it was public, private, or already known to the receiving party.
                                 The court  --- ound the de --- inition unreasonably broad and declined to en --- orce it as
                                 written. The decision underscores the importance o ---  tailoring NDAs to ­actual
                                 con --- identiality concerns and avoiding language that appears to overreach.



                                ­These cases illustrate a clear pattern. Courts expect NDAs to be speci --- ic, grounded
                            in operational real­ity, and proportionate to the in --- ormation they aim to protect. They
                            reward precision and punish overreach. They also look beyond the text o ---  the agree-
                            ment to see ­whether the com­pany behaved like it had something worth protecting.
                            An NDA is not a magic wand. It is part o ---  a system o ---  e ---

ort. When it — its that system, it becomes a power­ — ul tool. When it does not, it becomes evidence that the com­pany did not take its own secrets seriously.

                            4.3.2. En --- orcement o ---  Non-­Solicitation
                                    Clauses
                               Non-­solicitation clauses are designed to protect a com­pany’s relationships —­ both
                            with its customers and its employees. Courts evaluate them with more scrutiny than
                            NDAs but less skepticism than noncompetes. Their en --- orceability depends on how
                            narrowly they are drawn, ­whether they are tied to protectable interests such as trade
                            secrets or goodwill, and how they operate in practice. While courts are generally more
                            willing to en --- orce a clause that limits direct outreach than one that prohibits all  --- orms
                            o ---  competition, they still require that the restriction be reasonable and grounded in
                            the ­actual role o ---  the person subject to it.
                               Customer non-­solicitation clauses prevent  --- ormer employees  --- rom contacting or
                            attempting to do business with the com­pany’s clients. ­These clauses are more likely to
                            be upheld when they are ­limited to clients with whom the employee had material con-
                            tact or to relationships developed during a de --- ined period prior to departure. Clauses
                            that attempt to prevent contact with all current or prospective customers, regardless
                            o ---  connection, are o --- ten deemed overbroad.

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 120 1/12/26 2:51 PM 4 • Mitigating Internal Vulnerabilities 121

                   In a case  --- rom the ­Virginia state courts, an employer success --- ully en --- orced a cus-
                tomer non-­solicitation clause ­because it was narrowly tailored to cover only ­those
                relationships the employee had actively managed.


                                    Customer Non-­S olicitation En --- orced
                                         When Narrowly Tailored

                                                            Lasership, Inc. v. Watson
                                                             79 Va. Cir. 205 (2009)
                      Lasership, a delivery logistics com­pany, sued a  --- ormer employee who started a
                      competing ­service and contacted  --- ormer clients. The employment agreement
                     included a non-­solicitation clause prohibiting contact with customers whom
                     the employee had ser­viced within the past year. The court  --- ound the clause
                     en --- orceable, emphasizing that it was l­imited in both scope and duration and
                     clearly connected to the protection o ---  trade secrets and customer goodwill.
                     ­Because the employee had built direct relationships with the a ---

ected custom- ers, en — orcement was warranted.

                   In other cases, courts have rejected customer non-­solicits that sweep too broadly or
                are unsupported by evidence that the employee ever accessed sensitive client in --- orma-
                tion. In a Pennsylvania case, the court declined to en --- orce a clause that applied to all
                customers, including ­those the employee had never worked with.


                            Overbroad Non-­S olicits Are Unen --- orceable

                                                            WellSpan Health v. Bayliss
                                                            2005 PA Super 76 (2005)
                     WellSpan Health sought to en --- orce a non-­solicitation clause against a  --- ormer
                     executive who moved to a competing healthcare provider. The clause prohib-
                     ited contact with any current or prospective customer o ---  WellSpan, regardless
                     o ---  ­whether the executive had any relationship with them. The court re --- used
                     to en --- orce the restriction, holding that it was not reasonably tailored to pro-
                     tect trade secrets or goodwill. The decision emphasized that non-­solicitation
                     clauses must be connected to the employee’s ­actual scope o ---  responsibility and
                     not be used as a general barrier to competition.



                   Employee non-­solicitation clauses are similarly ­limited. Courts are willing to uphold
                provisions that prevent a  --- ormer employee  --- rom raiding a team or undermining inter-
                nal stability, but they are wary o ---  clauses that attempt to prevent all communication or

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 121 1/12/26 2:51 PM 122 4 • Mitigating Internal Vulnerabilities

                            that  --- unction as de  --- acto noncompetes. The central inquiry is ­whether the employee’s
                            actions ­were targeted and ­whether the clause is proportionate to the com­pany’s inter-
                            est in preventing disruption.
                               In a case involving a sta ---

ing — irm, the court upheld a non-­solicit ­because the departing employee had attempted to move several key sta —


members to a new com- petitor within days o — leaving.

                                              Employee Non-­S olicits En --- orced When
                                                  Targeted and Proportionate

                                                             TEKsystems, Inc. v. Bolton
                                             No. 2:19-­CV-02355, 2019 WL 237388 (D. Kan. Jan. 16, 2019)
                                 A recruiter  --- or TEKsystems le --- t the com­pany and began soliciting  --- ormer cowork-
                                 ers to join a direct competitor, despite a one-­year employee non-­solicitation
                                 clause in her contract. The court  --- ound that the clause was en --- orceable and nar-
                                 rowly tailored. The employee had direct relationships with ­those she solicited,
                                 and the court held that the com­pany had a legitimate interest in preventing
                                 immediate team disruption. The case demonstrates how en --- orcement is closely
                                 tied to the  --- actual context and the nature o ---  the departing employee’s role.



                                Taken together, ­these cases re --- lect a common theme. Courts expect non-­solicitation
                            clauses to be used precisely and sparingly. They must match the employee’s ­actual
                            responsibilities, target speci --- ic risks such as trade secret misuse or goodwill disrup-
                            tion, and avoid  --- unctioning as indirect noncompetes. When dra --- ted and applied
                            in this way, they can be highly e ---

ective. But when used broadly, without re — erence to ­actual exposure or competitive harm, they are likely to be narrowed or rejected. En — orcement is not a question o — ­whether solicitation occurred. It is a question o —

                            ­whether the restriction was  --- air.


                            4.3.3. En --- orcement o ---  Noncompetition
                                    Clauses
                               Noncompetition clauses are the most controversial and least consistently en --- orced
                            type o ---  restrictive covenant. While employers view them as necessary to prevent
                            insiders  --- rom immediately undermining competitive advantage, courts view them
                            with skepticism. They are dis --- avored ­because they restrict an individual’s ability to
                            work, earn a living, and use general skills and experience. Courts ­will en --- orce them
                            only when the restriction is narrowly tailored, the interest protected is legitimate, and
                            the burden on the employee is not excessive.

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 122 1/12/26 2:51 PM 4 • Mitigating Internal Vulnerabilities 123

                    The l­egal standard varies by jurisdiction. In some states, such as Cali --- ornia, non-
                competes are generally void as a ­matter o ---  statute, with only narrow exceptions  --- or
                the sale o ---  a business or protection o ---  trade secrets through other means. In ­others,
                such as New York or Texas, courts apply a balancing test that considers duration,
                geographic scope, industry speci --- icity, and necessity. The clause must be reasonable
                in light o ---  the employee’s role and the nature o ---  the threat to the employer’s interest.
                The employer must show that the restriction is not simply about preventing compe-
                tition —­ it must be aimed at preventing un --- air competition arising  --- rom misuse o ---

                con --- idential in --- ormation, goodwill, or customer relationships.
                   Duration is a central ­ --- actor. Courts are more likely to en --- orce a clause that lasts
                six months or one year than one that extends  --- or two years or longer. Scope ­matters
                as well. A clause that prohibits work in a speci --- ic industry or geographic area may be
                upheld i ---  the employee held a ­senior role with extensive access to sensitive strategy.
                But a clause that attempts to bar all competitive activity regardless o ---  location or  --- unc-
                tion ­will likely be struck down or modi --- ied.
                   In one leading case, the Seventh Cir­cuit enjoined a departing executive ­under a
                theory o ---  threatened misappropriation, even though he had not signed a noncompete
                agreement. The court  --- ound that the executive’s intimate knowledge o ---  con --- idential
                business strategy would likely in --- luence his work at a direct competitor, making mis-
                use almost inevitable. This reasoning gave rise to the inevitable disclosure doctrine,
                which allows courts to in --- er that trade secret misappropriation is likely to occur and
                enjoin  --- ­uture employment as a remedy. Although not  --- ormally a noncompete, the
                injunction  --- unctioned as a de  --- acto noncompete by limiting the employee’s ability to
                work in the same industry based solely on the risk o ---  disclosure.



                            “Inevitable Disclosure” Can Justi --- y De Facto
                                        Noncompete Relie ---


                                                             PepsiCo, Inc. v. Redmond
                                                            54 F.3d 1262 (7th Cir. 1995)
                     Redmond, a ­senior executive at PepsiCo, accepted a job with Quaker, a direct
                     competitor. PepsiCo sued to prevent him  --- rom taking the role, arguing that he
                     would inevitably disclose or use PepsiCo’s con --- idential marketing and pric-
                     ing strategies. The court agreed, granting a preliminary injunction even in the
                     absence o ---  ­actual disclosure. The decision was grounded in Redmond’s inti-
                     mate knowledge o ---  PepsiCo’s competitive planning and the similarity o ---  his
                     new responsibilities. The case became a  --- oundational authority  --- or the inevi-
                     table disclosure doctrine and remains one o ---  the most widely cited examples o ---

                     proactive en --- orcement.

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 123 1/12/26 2:51 PM 124 4 • Mitigating Internal Vulnerabilities

                               Not all courts accept the inevitable disclosure theory. Some require concrete evi-
                            dence o ---  ­actual misuse. ­Others view the doctrine as a backdoor noncompete and
                            reject it on public policy grounds. Even in jurisdictions that allow the doctrine, it
                            is applied cautiously, typically only where the employee’s role at the new com­pany
                            would make it impossible to avoid using the  --- ormer employer’s secrets.
                               When a noncompete is too broad, courts may modi --- y it ­under the so-­called blue
                            pencil doctrine. In some jurisdictions, courts ­will rewrite a clause to make it en --- orce-
                            able. In ­others, they ­will en --- orce only the part that is reasonable and strike the rest. But
                            some courts re --- use to salvage overbroad clauses at all, especially where the employer
                            appears to have overreached. In a Florida case, the court declined to en --- orce a sweep-
                            ing noncompete that barred the employee  --- rom working anywhere in the state even
                            though the employer operated in only a  --- ew counties.


                                        Overbroad Noncompetes Are Unen --- orceable

                                                            Gupton v. Village Inn Pancake ­House
                                                                 89 So. 2d 847 (Fla. 1956)
                                 Gupton le --- t Village Inn to open his own restaurant. The com­pany sought to
                                 en --- orce a noncompete that prohibited him  --- rom working in the restaurant
                                 business anywhere in Florida  --- or two years. The court  --- ound the restriction
                                 excessive, noting that Village Inn had only ­limited operations in the state and
                                 that the clause appeared designed to eliminate law --- ul competition. The court
                                 re --- used to modi --- y or en --- orce the clause, emphasizing the importance o ---  dra --- t-
                                 ing covenants that re --- lect real business needs.



                               The lesson  --- rom ­these cases is that noncompetes are en --- orceable only when they
                            are used care --- ully. Courts ­will not allow employers to block  --- ormer employees  --- rom
                            earning a living or working in their chosen  --- ield ­unless the clause is clearly connected
                            to the protection o ---  in --- ormation or relationships that the law recognizes as worthy
                            o ---  special protection. Employers must be prepared to explain why the restriction is
                            necessary, how it is ­limited, and why no less restrictive option would su ---

ice. Well-­dra — ted noncompetes can protect the investment a com­pany has made in training, strategy, and client development. But they must be treated as exceptions, not de — aults. When they are overused or poorly justi — ied, they risk not only invalida- tion but also reputational harm. They must be built on real risk —­ and structured to survive real scrutiny. In 2024, the Federal Trade Commission issued a — inal rule banning most noncom- pete clauses nationwide, citing their negative e —


ects on l­abor mobility, wages, and innovation. The rule applies prospectively and retroactively in many cases, though it includes ­limited exceptions — or ­senior executives and in connection with the sale o — a

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 124 1/12/26 2:51 PM 4 • Mitigating Internal Vulnerabilities 125

                business. However, the rule has already been challenged in multiple lawsuits assert-
                ing that the FTC lacks statutory authority to regulate in this space. The outcome
                o ---  this litigation remains uncertain, but the rule re --- lects a broader regulatory and
                ­political shi --- t ­toward restricting or eliminating noncompete agreements as a ­matter
                 o ---  public policy.


                4.3.4. En --- orcement o ---  Invention Assignment
                       and IP Clauses
                    Owner­ship o ---  intellectual property created during the course o ---  employment is not
                automatic. ­Unless the employer has secured a written assignment, the de --- ault rule
                is that the creator —­ usually the employee —­ retains owner­ship, even when the work
                was developed in the scope o ---  employment or using com­pany resources. Invention
                assignment clauses are meant to prevent this ambiguity. They assign to the employer
                any inventions or works o ---  authorship that arise  --- rom the employee’s work and relate
                to the com­pany’s business. When properly dra --- ted and consistently en --- orced, ­these
                clauses provide a ­legal  --- oundation  --- or claiming owner­ship o ---  trade secrets, con --- iden-
                tial methods, and other  --- orms o ---  proprietary innovation.
                   Courts generally en --- orce invention assignment clauses when the terms are clear,
                the scope is reasonable, and the connection to the com­pany’s business is speci --- ic.
                However, they are cautious about clauses that attempt to sweep in inventions created
                on the employee’s own time, especially when ­those inventions are unrelated to the
                employer’s  --- ield o ---  work. Many states impose statutory limitations. Cali --- ornia,  --- or
                example, prohibits assignment o ---  inventions developed entirely on personal time and
                without use o ---  employer resources ­unless the invention relates directly to the com­
                pany’s business or expected research and development. Other states  --- ollow similar
                rules, requiring that the clause re --- lect the ­actual relationship between the invention
                and the employer’s interests.
                   In a key Cali --- ornia case, the court re --- used to en --- orce an invention assignment
                clause that sought to claim owner­ship over an employee’s side proj­ect developed out-
                side o ---  com­pany time and without com­pany materials.


                                Invention Assignment Agreements Must
                                        Comply with State Law

                           Applied Materials, Inc. v. Advanced Micro-­Fabrication Equipment, Inc.
                             No. 5:07-­cv-05248, 2009 WL 10694784 (N.D. Cal. Feb. 17, 2009)
                     Applied Materials sued a  --- ormer employee and his new com­pany, claim-
                     ing that trade secrets and inventions created ­a --- ter his departure should be
                     assigned ­under his prior employment agreement. The agreement included a

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 125 1/12/26 2:51 PM 126 4 • Mitigating Internal Vulnerabilities

                                 broad invention assignment clause, but the court  --- ound that Cali --- ornia ­Labor
                                 Code section 2870 prohibited assignment o ---  inventions developed entirely on
                                 the employee’s own time, using no com­pany resources, and unrelated to the
                                 employer’s business. ­Because the invention did not  --- all within the statutory
                                 exceptions, the clause was unen --- orceable as applied.



                               Cases like this underscore the importance o ---  tailoring invention assignment lan-
                            guage to comply with state law. Overly aggressive language may not only  --- ail to protect
                            the com­pany —­ it may also trigger ­legal challenges or render the entire clause void. The
                            most e ---

ective clauses are ­those that assign rights clearly, provide notice o — statutory carveouts, and create procedures — or employees to disclose ­independent proj­ects — or review. Courts are more likely to uphold a clause that re­spects employee rights while sa — eguarding the com­pany’s legitimate interests. Companies should also ensure that their assignment clauses are rein — orced by con- sistent onboarding, training, and exit procedures. Signing the clause is only the begin- ning. Employees should be reminded o — their continuing obligations, and procedures should be in place to con — irm return o — work product and con — idential material at the end o — the relationship. Without this — ollow-­through, even a well-­dra — ted clause may lose its value in en — orcement. Assignment clauses play a crucial role in trade secret litigation. When a departing employee claims to have developed a method in­de­pen­dently, the com­pany must be able to point to a signed agreement that covers the work and establishes owner­ship. Without it, the l­egal basis — or claiming misappropriation may be signi — icantly weak- ened. But to be e —


ective, the clause must not only exist —­ it also must be en — orceable. And to be en — orceable, it must be both legally compliant and practically connected to the way the com­pany and the employee actually operated.

                            4.3.5. Public Policy Limits on Restrictive
                                    Covenants
                                Even the most care --- ully dra --- ted restrictive covenant may be unen --- orceable i ---  it con-

licts with public policy. Courts do not evaluate ­these clauses in a vacuum. They exam- ine the broader context in which they are used —­ who is subject to the restriction, what the restriction prevents, and ­whether en — orcement would undermine princi­ples such as employee mobility, economic — airness, or statutory protections — or innovation. In some states, public policy limits are codi — ied. In ­others, they emerge — rom common law decisions that balance the interests o — employers against the rights o — individuals and the public. Cali — ornia is the most well-­known example o — a jurisdiction that prohibits most non- compete agreements. ­Under section 16600 o — the Cali — ornia Business and Pro — essions

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 126 1/12/26 2:51 PM 4 • Mitigating Internal Vulnerabilities 127

                Code, any contract that restrains a person  --- rom engaging in a law --- ul pro --- ession, trade,
                or business is generally void. The  --- ew exceptions include the sale o ---  a business and
                protection o ---  trade secrets through narrowly drawn covenants that do not operate as
                blanket bans. Mas­sa­chu­setts, Illinois, Colorado, and Washington have also enacted
                statutes limiting the use o ---  noncompetes  --- or low-­wage workers, requiring advance
                notice, or imposing other procedural sa --- eguards. ­These laws are intended to prevent
                overuse o ---  restrictions that could suppress ­labor mobility or chill innovation.
                   Even in states without speci --- ic legislation, courts may re --- use to en --- orce a covenant
                that appears punitive, anticompetitive, or unnecessary. In one New York case, the
                court rejected a noncompete imposed on a  --- ormer employee with no managerial
                responsibilities,  --- inding that the restriction served no legitimate interest and posed a
                barrier to ordinary ­career progression.


                                  Restrictive Covenants Cannot Violate
                                               Public Policy

                                                      Brown & Brown, Inc. v. Johnson
                                                          25 N.Y.3d 364 (2015)
                     Brown & Brown, an insurance brokerage  --- irm, sought to en --- orce a noncompete
                     against a ­junior employee who le --- t to join a competitor. The clause barred the
                     employee  --- rom working in any capacity  --- or a competing  --- irm within a large
                     geographic region  --- or two years. The court  --- ound the restriction unen --- orceable,
                     holding that it was broader than necessary to protect client relationships or
                     trade secrets and imposed an unreasonable burden on the employee’s ability to
                     work. The ruling emphasized that covenants not to compete must be justi --- ied
                     by a speci --- ic, protectable interest —­ not simply the desire to avoid competition.



                   Public policy limits also a ---

ect how trade secret claims are evaluated. I — a restric- tive covenant is so broad that it appears to be a substitute — or trade secret protection rather than a supplement to it, courts may reject both the contract and the trade secret claim. A com­pany that attempts to prevent competition by labeling all in — ormation as con — idential or using blanket restrictions on employee activity may lose credibility when it asserts that the in — ormation at issue quali — ies as a trade secret. Courts are more likely to — ind secrecy where the com­pany has used calibrated protections, and they are more likely to reject it where the com­pany has used expansive contracts to mask weak internal discipline. The policy trend in recent years has moved steadily in ­ — avor o — employee rights. Legislatures and courts alike have sought to limit the use o — restrictive covenants that — unction as tools o — control rather than as legitimate protection. Employers must adapt their strategies accordingly. This does not mean that restrictive covenants are

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 127 1/12/26 2:51 PM 128 4 • Mitigating Internal Vulnerabilities

                            obsolete. It means that their role must be narrowly de --- ined, care --- ully justi --- ied, and

irmly anchored in the ­actual risks the com­pany ­ — aces. A covenant that overreaches may not only — ail —­ it may erode the com­pany’s ability to en — orce more modest protections. A covenant that is well-­matched to the task, by contrast, ­will stand a stronger chance o — en — orcement and ­will support the broader claim that the com­pany took its obligation to protect trade secrets seriously. In this way, public policy is not a barrier to trade secret en — orcement. It is a reminder that en — orcement must rest on real interests, not ­imagined ones.

                                      4.4. Access Controls and Operational
                                                   Sa --- eguards
                               Restrictive covenants provide one layer o ---  protection. Operational discipline pro-
                            vides another. Courts ­will not en --- orce a contract in the abstract; they look  --- or evidence
                            that the com­pany built secrecy into its everyday systems. The most compelling proo ---

                            that a business took reasonable steps to protect its trade secrets is not what it said in
                            an agreement but what it did in practice. That inquiry begins with access control.
                                A trade secret can only be protected i ---  it is treated as secret. I ---  con --- idential ­in --- ormation
                            is accessible to all employees regardless o ---  role, i ---  it is stored in shared  --- olders without
                            restriction, or i ---  it is le --- t unsecured in physical spaces, courts may conclude that the
                            com­pany did not take secrecy seriously. Protection begins with limitation: who can see
                            the in --- ormation, ­under what circumstances, and through which systems.
                                Role-­based access is the  --- oundation o ---  control. Each employee or contractor should
                            have access only to the materials necessary  --- or their speci --- ic duties. This is not merely
                            a technical best practice —­ it is a l­egal signal. I ---  the com­pany can show that only a
                            ­limited number o ---  individuals had access to a par­tic­u­lar dataset,  --- ormula, or design,
                             and that ­those individuals ­were bound by appropriate contractual and policy sa --- e-
                             guards, courts are more likely to  --- ind that the in --- ormation was in  --- act kept secret.
                                Access control also includes digital and physical security. Trade secrets o --- ten reside
                            in code repositories, product development systems, shared drives, email attachments,
                            and internal messaging tools. They also live on whiteboards, in lab notebooks, in
                            engineering mock-­ups, and in physical product samples. Each o ---  ­these settings cre-
                            ates opportunities  --- or exposure. Courts have looked closely at ­whether access to sen-
                            sitive materials was password-­protected, ­whether  --- ile permissions ­were restricted,
                            ­whether laptops ­were encrypted, and ­whether physical rooms ­were badge-­locked
                            or surveillance-­monitored. No one sa --- eguard is dispositive, but the accumulation o ---

                            many small controls creates a compelling rec­ord o ---  reasonable e ---

ort. Labeling and version control rein — orce ­these protections. Materials that contain or re — lect trade secrets should be clearly marked as con — idential or proprietary. Where labels are missing, courts may treat the in — ormation as i — it ­were public. Version control

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 128 1/12/26 2:51 PM 4 • Mitigating Internal Vulnerabilities 129

                also ­matters. I ---  a trade secret evolves over time, courts may ask ­whether ­earlier itera-
                tions ­were separately protected or i ---  the secret as a ­whole was diluted by open circula-
                tion o ---  partial versions. Document management is not just an internal ­convenience.
                It is part o ---  the ­legal in --- rastructure that supports the claim.
                    Monitoring and auditing provide the  --- eedback loop. It is not enough to restrict
                access. The com­pany must also know when restrictions are breached, who has down-
                loaded sensitive  --- iles, when unusual access patterns occur, and ­whether any devices
                containing con --- idential in --- ormation have been lost or compromised. Modern log
                management systems can generate alerts when access levels are elevated, documents
                are exported, or downloads exceed baseline norms. ­These systems do not need to catch
                ­every breach. But they must exist, and they must be capable o ---  demonstrating, ­a --- ter the

act, that access to the trade secret was not uncontrolled. Access controls cannot stand still. As employees move into new roles, as proj­ects change, or as systems evolve, permissions must be updated. Former employees must be removed — rom repositories immediately upon separation. Temporary permissions must expire when tasks are complete. Vendors and contractors must have de — ined scopes o — access with limitations on onward sharing ( — urther disclosure beyond the original recipient) or retention. Where companies — ail to adjust access as circum- stances change, courts may conclude that the protections ­were per — ormative, not real. When a court asks ­whether a com­pany took reasonable steps to protect its trade secrets, it is asking ­whether the ­organization acted like secrecy mattered. The answer is — ound not in the contract archive but in the permissions matrix, activity logs, email servers, and badge swipe rec­ords. The best l­egal protection is the one the com­pany already built —­ be — ore anyone asked to see it.

                4.4.1. Role-­Based Access Limitation
                   The simplest and most power­ --- ul way to reduce internal vulnerability is to ensure
                that employees can only access the in --- ormation they need. This princi­ple, o --- ten
                re --- erred to as “least privilege” or “need to know,” is central to both operational secu-
                rity and ­legal protection. Courts routinely ask ­whether a trade secret was shared only
                with ­those who required it and ­whether the com­pany ­limited access according to the
                responsibilities o ---  each role. A business that exposes its con --- idential in --- ormation to all
                personnel, regardless o ---

unction, ­ — aces an uphill ­battle in proving that the in — orma- tion was truly kept secret. Role-­based access control means de — ining, in advance, which individuals or job categories are permitted to see which types o — in — ormation. In a development-­driven com­pany, this might mean that engineers have access to the product architecture but not to customer pricing. Sales personnel may see pricing tiers but not source code. Administrative sta —


may have access to scheduling tools but not to vendor contracts or prototype designs. Each role carries a di — ­ — er­ent risk, and access must be tailored accordingly.

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 129 1/12/26 2:51 PM 130 4 • Mitigating Internal Vulnerabilities

                               This tailoring can take many  --- orms. Some companies de --- ine access permissions
                            in  --- ormal documentation, tying them to job descriptions or system pro --- iles. ­Others
                            implement access hierarchies through technical systems: password-­protected drives,
                            VPN limitations, project-­based  --- ile shares, or departmental  --- older structures. The
                            method ­matters less than the outcome. Courts want to see that the com­pany knew
                            where its secrets lived and made deliberate choices about who could see them.
                                Role-­based limitation also requires ­organizational discipline. I ---  access controls are
                            de --- ined but not en --- orced —­ i ---  credentials are shared, i ---

olders are broadly accessible, or i — employees routinely store sensitive — iles in personal drives —­ then the existence o — a policy ­will do ­little to support the claim. Courts do not evaluate intentions. They evaluate structure. The gap between stated policy and ­actual practice is o — ten the gap in ­legal protection. This structure must adapt as roles change. When employees move between depart- ments, are promoted, or shi — t proj­ects, access should be reevaluated. I — a marketing lead transitions to a strategic role, access to analytics or R&D documentation may need to be expanded or newly ­limited. Similarly, i — an employee leaves a proj­ect, their access to that material should be revoked. Temporary credentials should expire auto- matically. Project-­based — olders should be archived or decommissioned once devel- opment ends. The point is that static access — rameworks become obsolete, and only dynamic systems can re — lect the evolving structure o — a real business. Companies that implement strong role-­based access controls have a clear advantage in litigation. They can show who saw the secret, when, and ­under what conditions. They can demonstrate that disclosure was ­limited by design, not just by accident. And they can point to a system o — permissions that tracks responsibility rather than one that allows in — ormation to circulate without restraint. When courts see this structure, they are more likely to credit the com­pany’s claim that the in — ormation was secret ­because it was treated as such.

                            4.4.2. Document Control, Labeling, and
                                    Classi --- ication
                                A trade secret must be treated as a secret not in theory alone but rather in the way
                            it is stored, circulated, and labeled. Courts do not expect companies to mark ­every
                            email or Slack message. But they do expect a pattern o ---  discipline —­ one that signals
                            to employees, contractors, and outsiders that certain categories o ---  in --- ormation are
                            subject to con --- identiality restrictions. Labeling and document management are not

ormalities. They are part o — the — actual rec­ord that supports a trade secret claim. The most basic — orm o — document control is marking. When a com­pany consistently labels documents containing con — idential in — ormation, it strengthens its ability to ­later claim that the in — ormation was understood as secret. Labels might include headers

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 130 1/12/26 2:51 PM 4 • Mitigating Internal Vulnerabilities 131

                such as “Con --- idential,” “Trade Secret,” or “Proprietary,” or they may use internal coding
                systems tied to document sensitivity. What ­matters is that the labels are vis­i­ble, used
                systematically, and understood internally. Courts have given weight to labeling even
                where the under­lying in --- ormation was l­ater challenged as too obvious or too widely
                known. The presence o ---  a con --- identiality label is not decisive, but it demonstrates that
                the com­pany made a conscious e ---

ort to identi — y what required protection. Classi — ication goes — urther. Many companies use tiered systems to identi — y levels o —

                con --- identiality. A basic  --- ramework might distinguish between “Internal Use,” “Con-

idential,” and “Restricted.” More detailed systems may include role-­based clearance,


lags — or export control, or automatic redaction triggers. ­These systems serve two purposes. Internally, they in — orm employees about how in — ormation may be shared. Legally, they create a rec­ord o — how the com­pany handled sensitive material. A — ile labeled “Restricted —­ Engineering Only” that resides on a segmented server and whose access is l­imited to a speci — ic team is — ar more de — ensible than an unlabeled document circulating in a shared drive. Version control supports t­hese e —


orts. Many trade secrets are not static. They evolve through dra — ts, iterations, and collaborative input. I — ­earlier versions o — a secret are circulated without restriction, or i — dra — ts remain accessible in shared — olders long ­a — ter the — inal product has been released, the claim o — secrecy may be undermined. Companies must be able to show which version o — the in — ormation was protected, who had access to it, and how the transition between dra — ts was managed. This is especially impor­tant in so — tware, where older versions o — code may be reused or stored in repositories with broader access than the — inal release. Email and messaging plat — orms pre­sent special challenges. Trade secrets are o — ten discussed, re — ined, and circulated in — ragments —­ paragraphs, comments, screen- shots —­ within systems that are not built — or classi — ication. While companies are not expected to control ­every in — ormal message, they are expected to control access to attachments, limit circulation o —


iles, and monitor ­whether key in — ormation is being handled appropriately. Policies that require labeling o — attached documents, restrict


orwarding outside o — authorized teams, or archive con — idential threads — or review can all support the com­pany’s case. Document control also extends to retention and deletion. I — sensitive in — orma- tion remains accessible long ­a — ter a proj­ect ends, or i — con — idential dra — ts are retained in­de — ­initely in unprotected systems, courts may conclude that the com­pany — ailed to maintain secrecy. The standard is not per — ection. It is reasonableness. But a — ailure to purge, archive, or restrict obsolete materials can become evidence o — indi —


erence, and indi —


erence is rarely consistent with secrecy. When a trade secret is lost, the com­pany must be able to show how it was handled be — ore the loss occurred. I — it was labeled, tracked, versioned, and stored according to de — ined rules, courts are — ar more likely to — ind that secrecy was preserved. I — it was treated no di —


erently — rom any other — ile, the ­legal claim may — ail be — ore it begins.

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 131 1/12/26 2:51 PM 132 4 • Mitigating Internal Vulnerabilities

                            4.4.3. Monitoring, Auditing, and Insider
                                    Activity Detection
                               Secrecy is not a one-­time decision. It is a continuing obligation. A com­pany can-
                            not protect its trade secrets merely by dra --- ting good policies or restricting access. It
                            must also be capable o ---  knowing when ­those protections are being tested, bypassed, or
                            ignored. Monitoring and auditing are what make the system real. They convert  --- ormal
                            controls into practical sa --- eguards. And they generate the kind o ---  evidence courts rely
                            on when evaluating ­whether a com­pany took secrecy seriously.
                               Monitoring begins with visibility. A business cannot protect what it cannot see. At
                            a minimum, systems should be con --- igured to log access to sensitive materials, includ-
                            ing who accessed what in --- ormation, when, and  --- rom where. ­These logs provide the
                            historical rec­ord needed to identi --- y patterns, detect anomalies, and, in some cases,
                            prove misappropriation. When a departing employee is suspected o ---  taking trade
                            secrets, access logs can reveal ­whether con --- idential  --- iles ­were downloaded in the days
                            be --- ore departure, ­whether external storage devices ­were connected, or ­whether login
                            activity occurred outside normal working hours.
                               The presence o ---  ­these logs can shape litigation. Courts do not require ­every com­
                            pany to have a sophisticated intrusion detection system. But they do expect that
                            sensitive systems are monitored and that unauthorized or suspicious activity trig-
                            gers investigation. In some cases, the  --- ailure to monitor has been cited as evidence
                            that the com­pany did not genuinely treat the in --- ormation as a secret. In ­others, the
                            ability to pinpoint when and how access occurred has made the di ---

erence between speculation and proo — . Auditing rein — orces ­these e —


orts. Regular reviews o — access permissions, user activ- ity, and policy compliance help ensure that the system remains e —


ective. Audits can identi — y dormant accounts that still have access, shared passwords, miscon — igured permissions, or other ­silent vulnerabilities. Courts have given weight to companies that per — orm regular internal audits and act on the — indings. When a business can show that it reviewed its own systems, updated its controls, and corrected de — iciencies, it sends a clear message that con — identiality was not le — t to chance. Insider activity detection extends beyond technical logs. Behavioral signals also ­matter. Companies should have pro­cesses in place to detect when employees begin to act in ways that suggest intent to leave or to take in — ormation with them. ­These signals may include copying large numbers o —


iles, sending attachments to personal accounts, printing con — idential documents, or accessing areas o — the system outside the scope o — a normal role. Detection tools can — lag this activity, but they are only use-


ul i — ­there is a response protocol. A — lagged activity must lead to inquiry. A pattern must lead to review. Monitoring and auditing are also relevant to policy en — orcement. A com­pany that monitors activity but does nothing when violations occur ­will be seen as tolerating

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 132 1/12/26 2:51 PM 4 • Mitigating Internal Vulnerabilities 133

                 breaches. Courts may ask ­whether policies ­were en --- orced uni --- ormly, ­whether train-
                 ing was  --- ollowed by veri --- ication, and ­whether known violations ­were addressed.
                 Inconsistent en --- orcement can undermine the entire system. By contrast, consistent

ollow-­through rein — orces the claim that trade secrets ­were not only de — ined —­ they ­were de — ended. Fi­nally, detection systems help companies respond in real time. When a breach is identi — ied early, the com­pany may be able to seek an injunction, preserve evidence, or limit the spread o — the in — ormation. I — detection is delayed, the opportunity to act may be lost. Trade secret protection is time-­sensitive. The sooner the risk is identi — ied, the stronger the ­legal and practical options ­will be. Monitoring, auditing, and detection are not simply security — unctions. They are part o — the l­egal argument. They demonstrate that the com­pany paid attention, took action, and created systems to ensure that its policies ­were more than words. Although courts do not expect per — ection, they do expect consistent e —


ort, and such e —


ort leaves a trail. In sum, to promote secrecy and protect its trade secrets, companies should: • Log access to sensitive — iles and systems, including date, time, user, and location o — access. • Establish baseline activity patterns — or employees in sensitive roles to detect anomalies. • Monitor — or red — lags such as large downloads, late-­night access, or o —


-­network activity. • Track use o — external storage devices, personal email, and unauthorized sharing plat — orms. • Conduct periodic audits o — user permissions to ensure access aligns with role requirements. • Document monitoring policies and ensure they are communicated to employees in writing. • Create escalation protocols — or responding to detected irregularities. • Retain access and audit logs — or a de — ined period to support potential ­ — uture investigations. • Integrate monitoring with exit procedures to review access activity prior to departure. • Review and update monitoring tools and audit procedures on a recurring schedule.

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 133 1/12/26 2:51 PM 134 4 • Mitigating Internal Vulnerabilities

                                                4.5. Onboarding and Training
                                Even the best systems  --- ail i ---  the ­people using them do not understand their pur-
                            pose. Contracts, access controls, and monitoring tools provide the technical and ­legal

ramework — or trade secret protection, but it is the work — orce that determines ­whether ­those sa — eguards are implemented, respected, and sustained. Courts evaluating trade secret claims o — ten look beyond the in — rastructure to ask what the com­pany did to educate its employees. Did the ­organization tell ­people what counted as con — idential? Did it explain how to ­handle sensitive in — ormation? Did it remind them, over time, that the obligation o — secrecy continued? Onboarding is where ­these answers begin. A new employee must not only sign the relevant agreements but also understand what they mean. This includes the nondisclosure agreement, the invention assignment clause, and any applicable non-­solicitation or noncompete provisions. But it also includes the policies that govern day-­to-­day be­hav­ior: how to store documents, where to save work, what sys- tems require credentials, and how to escalate questions or report concerns. Courts give weight to evidence that a com­pany explained its policies at the outset o — the relationship and rein — orced them through orientation, training, and documented acknowledgement. Merely providing documents is not enough. Employees o — ten sign stacks o —


orms at the start o — a new role, and courts recognize that signatures alone do not guarantee comprehension. Companies should take steps to ensure that the message o — con — i- dentiality is clear. This may include onboarding sessions that explain trade secret protections in plain language, walkthroughs o — how access systems work, or con — ir- mation emails summarizing key points. Some ­organizations require new employees to pass short training modules or quizzes. ­Others use orientation videos or onboard- ing portals. What ­matters is not the — ormat but rather the — act that the com­pany made an e —


ort to in — orm. Training should not stop ­a — ter orientation. Most employees ­handle con — idential in — ormation in an evolving environment. New tools, new proj­ects, and new team structures create ongoing risk. Regular training ensures that employees are reminded o — their obligations and are kept up to date on procedures. In some cases, courts have cited the absence o — any — ollow-up training as evidence that the com­pany’s con — iden- tiality culture was per — ormative. Where training occurs regularly, is recorded, and includes examples tied to the ­actual business, it rein — orces the credibility o — the com­ pany’s claim that it protected its secrets. Ongoing training is particularly impor­tant in ­organizations where trade secrets are embedded in ordinary work — lows. In technical environments, employees may not recognize that internal benchmarks, ­process improvements, or operational deci- sions constitute proprietary in — ormation. In sales ­organizations, pricing models or customer segmentation data may not be seen as con — idential ­unless that expectation

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 134 1/12/26 2:51 PM 4 • Mitigating Internal Vulnerabilities 135

                  is clearly stated. Training helps bridge this gap. It makes the bound­aries legible to
                  ­those who are responsible  --- or maintaining them.
                     Some o ---  the most damaging trade secret losses come not  --- rom malice but rather

rom misunderstanding. A well-­meaning employee may reuse a ­presentation tem- plate, include a client list in a resume, or carry — orward a coding shortcut without realizing that it contains protected in — ormation. Courts recognize that ­mistakes happen. But when ­those ­mistakes occur in a com­pany with no training, no remind- ers, and no e —


ort to educate, the court may conclude that secrecy was not a real priority. Training also has cultural signi — icance. It shows that con — identiality is not merely a l­egal concern but also a shared responsibility. When man­ag­ers rein — orce policies, when teams are brie — ed be — ore major product launches, or when exit interviews revisit con — identiality obligations, the message becomes institutional. Courts o — ten view this culture as one o — the strongest indicators o — reasonable e —


ort. A com­pany that trains its ­people, documents its policies, and rein — orces its values is more likely to persuade the court that its secrets ­were treated as secrets. To help ensure that employees are educated about and understand com­pany poli- cies, companies should implement an onboarding and training ­process that includes the — ollowing ele­ments: • Ensure that new employees review and sign all relevant agreements, including NDA, invention assignment, and any applicable noncompete or non-­solicitation clauses. • Explain what quali — ies as a trade secret in the context o — the com­pany’s operations. • Provide practical examples o — con — idential in — ormation employees ­will encounter in their role. • Walk through internal policies on document storage, labeling, and access restrictions. • Demonstrate how to access secure systems and how credentials are managed. • Review procedures — or reporting security concerns or suspected misuse. • Explain the employee’s ongoing duty o — con — identiality ­a — ter employment ends. • Require written acknowl­edgment o — orientation completion and understanding. • Document training delivery, including materials used and attendance rec­ords. • Schedule — ollow-up or re — resher training as part o — the employee’s integration plan.

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 135 1/12/26 2:51 PM 136 4 • Mitigating Internal Vulnerabilities

                                                  4.6. Exit Protocols and Post-­
                                                        Employment Risk
                               The most dangerous moment in the li --- e o ---  a trade secret is o --- ten when an employee
                            leaves. Departures concentrate vulnerability. They trigger downloads,  --- ile trans --- ers,
                            hasty communications, and quiet copying. They also disrupt work --- lows, reassign
                            responsibilities, and create uncertainty about what in --- ormation ­will be taken, remem-
                            bered, or reused. Exit protocols are there --- ore not just administrative pro­cesses. They
                            are a  --- inal opportunity to assert control.
                               Courts routinely examine what a com­pany did when a key employee le --- t. Did it
                            disable access immediately? Did it conduct a review o ---  system activity? Did it conduct
                            an exit interview and remind the departing employee o ---  ongoing obligations? Did it
                            retrieve devices, secure documentation, and require acknowl­edgment o ---  the duty to
                            maintain con --- identiality? Each o ---  ­these questions points to the same larger inquiry:
                            Did the com­pany act as i ---  its secrets still mattered even ­a --- ter the person who knew
                            them was walking out the door?
                               An e ---

ective exit protocol begins be — ore the — inal day. Companies should have a checklist o — procedures tied to trade secret protection. ­These procedures may include deactivating user credentials, revoking access to repositories, collecting company-­ owned devices, reviewing recent downloads or trans — ers, and auditing cloud stor- age or personal email use. The scope o — review should match the sensitivity o — the in — ormation. A departing executive with access to product strategy requires di — ­ — er­ent scrutiny than a j­unior team member with l­imited visibility. Courts do not require overreaction. They expect proportion. Exit interviews provide an opportunity to clari — y continuing obligations. Even where an employee signed a nondisclosure agreement at the outset, the com­pany strengthens its position by restating ­those duties at the end. This may involve asking the employee to con — irm that no con — idential in — ormation has been retained, copied, or shared. It may include reviewing what quali — ies as a trade secret, reminding the employee that contractual obligations survive termination, and con — irming that the employee has returned all materials. When ­these interviews are documented, they provide persua- sive evidence that the com­pany took the protection o — its secrets seriously. Some companies use separation agreements to restate key provisions, secure addi- tional assurances, or establish speci — ic repre­sen­ta­tions about in — ormation return. ­These agreements may include con — identiality rea —


irmations, reminders about inven- tion assignment, or additional clauses about competitive conduct. Where en — orceable, they may also include release language or dispute resolution provisions. Courts o — ten give weight to post-­employment agreements, particularly when they are signed with adequate consideration and clearly identi — y surviving obligations. Departures should also be — ollowed by internal adjustments. Access logs may need to be preserved. Systems may need to be recon — igured. Teams may need to be

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 136 1/12/26 2:51 PM 4 • Mitigating Internal Vulnerabilities 137

                reminded not to  --- orward documents or communicate with the  --- ormer employee. In
                some cases, competitors may need to be noti --- ied that the com­pany considers certain
                in --- ormation to be protected. ­These  --- ollow-up actions are not just  --- or show. They pre-
                vent misunderstanding, protect against inadvertent leaks, and ensure that the com­
                pany’s trade secret protections remain intact.
                    When a  --- ormer employee joins a competitor, the situation becomes more delicate.
                The com­pany may choose to send a letter to the new employer outlining the depart-
                ing employee’s obligations and requesting assurance that trade secrets ­will not be
                accessed or used. ­These letters are not threats. They are rec­ords. Courts have cited
                them as evidence that the com­pany acted to preserve secrecy and put ­others on notice.
                I ---  litigation arises, the com­pany ­will be able to show that it did not wait passively  --- or
                harm to occur.
                   Ultimately, post-­employment risk is not just about what the  --- ormer employee
                chooses to do. It is about what the com­pany chooses to control. Courts are  --- ar more
                likely to en --- orce restrictive covenants, grant injunctive relie --- , or award damages when
                they see that the com­pany treated the departure as a moment o ---  risk and responded
                accordingly. Exit protocols turn vulnerability into preparedness. They are the  --- inal
                chapter in the story the com­pany tells the court —­ and sometimes the most impor­
                tant one.
                    To minimize post-­employment risk, companies should:
                       • Disable all system access on or be --- ore the employee’s departure date,
                           including email, VPN, and internal plat --- orms.
                       • Recover all company-­owned devices, including laptops, phones, drives,
                           and access cards.
                       • Audit recent user activity  --- or irregular downloads, trans --- ers, or access
                           to sensitive systems.
                       • Conduct an exit interview that includes a review o ---  continuing
                           con --- identiality obligations.
                       • Require written certi --- ication that all com­pany in --- ormation has been
                           returned or deleted.
                       • Reiterate post-­employment restrictions stated in any applicable NDA,
                           noncompete, or non-­solicit agreement.
                       • Document any known proj­ects or  --- iles the employee had access to
                           at the time o ---  departure.
                       • Noti --- y relevant man­ag­ers and team members o ---  the employee’s departure
                           and rein --- orce noncommunication protocols i ---  needed.
                       • Consider sending a notice to the new employer i ---  ­there is a material risk
                           o ---  misappropriation.
                       • Archive access logs, certi --- ications, and separation documentation  --- or ­

uture re — erence or litigation.

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 137 1/12/26 2:51 PM 138 4 • Mitigating Internal Vulnerabilities

                                                            4.7. When Internal
                                                              Sa --- eguards Fail
                                No system is per --- ect. Even companies with strong policies, care --- ully dra --- ted con-
                            tracts, and well-­calibrated controls ­will sometimes experience losses. A laptop goes
                            missing. A departing employee takes  --- iles. A ­mistake is made, and sensitive in --- orma-
                            tion is exposed. When that happens, the question is not ­whether the com­pany  --- ailed.
                            It is how the com­pany responded.
                               Trade secret law does not require absolute prevention. It requires reasonable e ---

orts. That standard allows — or the real­ity that ­human error, technical breakdowns, and even intentional misconduct can occur despite a com­pany’s best intentions. But when sa — e- guards — ail, the com­pany must act quickly and deliberately to preserve its ­legal rights. Delay, inaction, or con — usion may suggest that secrecy was not a real priority and that the com­pany is reacting — or the — irst time rather than executing a plan. The most impor­tant step ­a — ter a — ailure is containment. I — a breach is suspected, access must be revoked immediately. Relevant logs should be preserved. Systems should be audited to determine what was taken, when, and by whom. I — devices are missing, they should be remotely wiped or deactivated i — pos­si­ble. I — documents ­were emailed externally, recipients may need to be contacted. The com­pany should act as i —

                            the in --- ormation still ­matters —­ ­because that is what the court ­will ask.
                                Investigation  --- ollows containment. The com­pany must determine ­whether the
                            incident involved a trade secret, ­whether any contractual obligations ­were breached,
                            and ­whether the recipient knew or should have known that the in --- ormation was
                            con --- idential. This requires not only technical analy­sis, but l­egal evaluation. Counsel
                            must review relevant agreements, policies, training rec­ords, and employee acknowl­
                            edgments. ­These materials ­will shape the com­pany’s ability to assert claims or de --- end
                            its actions in court.
                                Communication must be handled care --- ully. Internally, man­ag­ers and a ---

ected teams may need to be in — ormed. Access to shared drives may need to be restricted. New policies or reminders may be issued. Externally, the com­pany may choose to send a cease-­and-­desist letter, noti — y a competitor, or — ile a motion — or injunctive relie — . In some cases, the com­pany may be required to make public disclosures, — or example, ­under regulatory obligations or in the context o — an acquisition. But all such commu- nications should be vetted — or consistency and strategic alignment. Documentation is essential. Courts o — ten evaluate not just ­whether a com­pany responded but also ­whether it can prove what actions it took. The internal inves- tigation should be documented in a privileged report. Communications should be recorded. Decisions about response, noti — ication, and remediation should be tied to the com­pany’s broader trade secret protection plan. I — the case proceeds to litigation, this rec­ord ­will help establish that the com­pany did not act out o — panic but instead


ollowed a disciplined approach.

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 138 1/12/26 2:51 PM 4 • Mitigating Internal Vulnerabilities 139

                   Sometimes, internal  --- ailure reveals weaknesses in the system itsel --- . A breach may
                 uncover outdated access protocols, overly broad permissions, or poor logging. ­These
                issues should be addressed immediately —­ not just  --- or operational reasons but also
                ­because the ­legal doctrine expects learning. Courts understand that  --- ailure is pos­si­ble.
                 They are less  --- orgiving when  --- ailure repeats.
                    In rare cases, the breakdown is total. A product is leaked. A  --- ormula is disclosed.
                The secret is lost. Even then, ­legal action may still be available. Courts may grant dam-
                ages, issue injunctions to limit  --- urther use, or require competitors to return or destroy
                materials. But the com­pany’s position ­will depend heavi­ly on what it can show. I ---  the
                court concludes that the in --- ormation was never ­really protected, the law ­will not treat
                its loss as a violation.
                   This is why  --- ailure must be anticipated. A com­pany that prepares  --- or  --- ailure is
                not admitting de --- eat. It is preserving its ability to recover. ­Every trade secret protec-
                tion plan should include a response protocol, escalation paths, l­egal review proce-
                dures, and systems  --- or containment. When ­those are in place, the com­pany ­will be
                ready —­ not just to limit the damage but also to prove that it never ­stopped taking
                secrecy seriously.




                                4.8. Turning Policy Into Practice
                   Trade secret protection begins inside the ­organization. It is ­shaped not only by
                what the com­pany knows to be sensitive but also by what it does to protect that knowl-
                edge —­ day ­a --- ter day, across systems, contracts, and ­human be­hav­ior. This chapter
                has traced the  --- ull arc o ---  internal discipline,  --- rom the dra --- ting o ---  restrictive cove-
                nants to the en --- orcement o ---  operational sa --- eguards. It has shown how trade secret
                law rewards structure, punishes indi ---

erence, and holds companies accountable — or ­whether secrecy was real or merely presumed. The ­legal system does not demand per — ection. But it does demand seriousness. A com­pany that knows what its trade secrets are, limits access accordingly, trains its ­people to treat in — ormation care — ully, and responds promptly to breaches has already done most o — the work the law expects. A com­pany that writes ambitious policies but cannot show how they ­were implemented or that imposes sweeping restrictions with- out proportion may — ind that the law does not — ollow where the paperwork points. What distinguishes strong internal protection is not — ormality but credibility. Courts ask ­whether the protections in place re — lected the value o — the in — ormation, the vulnerability o — the system, and the roles o — the individuals involved. They exam- ine the words o — the contracts and the conduct o — the business. They look at what happened not when every­thing was — unctioning but rather when something went wrong. A com­pany’s ability to respond to that scrutiny is what turns policies into protection.

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 139 1/12/26 2:51 PM 140 4 • Mitigating Internal Vulnerabilities

                               At its core, trade secret law does not create secrecy. It recognizes it. That recog-
                            nition depends on ­whether the com­pany treated its in --- ormation like a secret in its
                            day-­to-­day li --- e. That means en --- orcing restrictions. It means revoking access. It means
                            monitoring, auditing, and responding to threats. It means educating employees and
                            con --- ronting risk. It means aligning internal discipline with external claims. And it
                            means accepting that trade secrets are not sel --- -­executing rights —­ they are  --- ragile
                            assets that exist only when the ­organization acts to preserve them.
                                The work o ---  protection does not end at the walls o ---  the com­pany. Many o ---  the most
                            serious trade secret threats arise not  --- rom insiders but  --- rom third parties: vendors,
                            partners, customers, collaborators. The next chapter addresses ­these external risks.
                            It examines how companies can preserve secrecy while working with ­others, how to
                            structure relationships that require in --- ormation sharing, and how to build contractual
                            and operational sa --- eguards that extend beyond the bound­aries o ---  internal control.
                            The princi­ples remain the same. But the terrain becomes more complex.

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 140 1/12/26 2:51 PM Chapter 5 Mitigating External Vulnerabilities

                   A trade secret does not lose protection merely ­because it is shared with ­others. Yet
                the moment con --- idential in --- ormation crosses ­organizational bound­aries, it becomes
                subject to a new set o ---  vulnerabilities —­ some predictable, ­others uncertain. Unlike
                internal disclosures, which can be governed by hierarchy, policy, and culture, external
                disclosures depend almost entirely on the structure o ---  the relationship. Courts do not
                in --- er protection simply ­because in --- ormation was valuable or shared with caution.
                Instead, they examine ­whether the disclosing party took a ---

irmative, reasonable steps to control how the in — ormation was used, accessed, and retained by third parties. External vulnerabilities arise in countless — orms: vendors with system-­level access, partners in joint development e —


orts, customers evaluating early-­stage prototypes, cloud plat — orms hosting proprietary code, and distribution channels with l­ittle vis- ibility into downstream users. Each interaction brings with it not only the risk o —

                misappropriation but also the uncertainty o ---  misalignment. A com­pany may believe
                it has l­imited use to a de --- ined purpose, while the recipient sees the in --- ormation as

reely usable once the — ormal proj­ect ends. ­These con — licts rarely turn on bad — aith. More o — ten, they result — rom ambiguous contracts, missing bound­aries, or — ailure to anticipate how con — idential in — ormation ­will behave once embedded in shared sys- tems or deliverables. The law’s standard remains the same: a trade secret must be subject to reasonable e —


orts to maintain its secrecy. But in external contexts, what quali — ies as “reasonable” is no longer a ­matter o — internal discipline but o — design. Contracts must de — ine use and owner­ship with precision. Technical systems must limit access and rec­ord activ- ity. Termination clauses must ensure that trade secrets do not survive the deal but rather dis­appear — rom the recipient’s possession and systems. Above all, the relation- ship must be structured to create traceability: a clear path to determine who accessed what, when, and — or what purpose. Without that traceability, en — orcement becomes speculative, and ­legal protection collapses into a presumption o — waiver. This chapter examines how trade secret holders can mitigate ­these external vulner- abilities through thought — ul contract design, segmented access, targeted use restric- tions, and en — orceable exit provisions. Each section — ocuses on a di — ­ — er­ent relationship

                                                            141

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 141 1/12/26 2:51 PM 142 5 • Mitigating External Vulnerabilities

                            type —­ vendors, collaborators, customers, or distributors —­ and explains how courts
                            have evaluated e ---

orts to protect trade secrets in ­these settings. Case law is integrated throughout, not to cata­logue outcomes but to reveal where protection strategies suc- ceed or — ail in practice. Breakout boxes o —


er model contractual provisions along with dra — ting notes, illustrating how di — ­ — er­ent clause variants shi — t the l­egal terrain. The goal is not to eliminate external vulnerability altogether. It is to contain it so that trade secrets remain de — ensible even when they must be shared.

                                                 5.1. External Vulnerability as
                                                      a Structural Prob­lem
                               Trade secrets do not exist in isolation. They are o --- ten embedded in partnerships,
                            shared in vendor relationships, and exposed during customer engagement. What
                            makes t­hese external interactions dangerous is not that they involve outsiders but
                            rather that they introduce a loss o ---  structural control. When in --- ormation is shared
                            with employees, internal protocols and cultural expectations  --- ill in the gaps. But when
                            in --- ormation is shared with another ­organization, the only source o ---  discipline is what
                            the parties have agreed to. That agreement, ­whether contractual, procedural, or archi-
                            tectural, must carry the  --- ull burden o ---  secrecy.
                                The vulnerability ­here is both l­egal and operational. Legally, external disclosures
                            without clear constraints may destroy trade secret status entirely. Courts consistently
                            hold that sharing valuable in --- ormation without protective conditions is  --- atal, even
                            i ---  the disclosing party believed it was acting cautiously. Operationally, third-­party
                            recipients are not subject to internal access controls or training. They may have their
                            own vendors, subcontractors, and plat --- orms, each o ---  which introduces additional
                            exposure ­unless explic­itly barred or constrained. The trade secret becomes a traveler,
                            not a resident.
                               ­These vulnerabilities are compounded by uncertainty. Many external relationships
                            are open-­ended or exploratory: collaborative R&D, licensing talks, customer ­pilots.
                            The parties may not know what ­will be developed, what ­will be retained, or who ­will
                            ultimately own the resulting insight. Ambiguity about scope, owner­ship, and post-­
                            termination rights is not just a business risk —­ it is a ­legal vulnerability. Courts evalu-
                            ating trade secret claims ­will ask ­whether the disclosing party took steps to prevent
                            the very ambiguity that now clouds the dispute.

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 142 1/12/26 2:51 PM 5 • Mitigating External Vulnerabilities 143

                             Contractual Sa --- eguards Are Essential  --- or
                                     Trade Secret Protection

                                           Auto Channel, Inc. v. Speedvision Network, LLC
                                                144 F. Supp. 2d 784 (W.D. Ky. 2001)
                     Auto Channel disclosed proprietary programming concepts and marketing
                     strategies to Speedvision during joint venture negotiations. No nondisclosure
                     agreement was signed. When Speedvision l­ater launched a competing net-
                     work, Auto Channel sued  --- or misappropriation. The court granted summary
                     judgment  --- or the de --- endant, holding that the in --- ormation was not protected
                     ­because it had been disclosed without any  --- ormal con --- identiality obligation.
                      The court emphasized that even valuable and original in --- ormation loses trade
                      secret status when shared without sa --- eguards. Caution alone is not enough.
                      Contractual protection is essential.



                    The lesson  --- rom Auto Channel is not simply that NDAs ­matter but that structure
                ­matters. A com­pany that shares trade secrets externally must design the relationship
                 to preserve l­egal protection at ­every stage: be --- ore disclosure, during collaboration,
                 and ­a --- ter termination. The initial agreement should de --- ine what is con --- idential and
                 how it may be used. The working arrangement should control who has access and
                 what rec­ords are kept. The exit provisions should require return or destruction and
                 clari --- y that rights do not survive the deal. Without t­hese constraints, even care --- ul
                 businesses may  --- ind that their secrets no longer quali --- y  --- or ­legal protection.
                   The  --- ollowing sections examine ­these structural vulnerabilities in context, begin-
                ning with vendor relationships —­ which are o --- ten the most underestimated source o ---

                external exposure.



                                         5.2. Vendor Relationships
                   Vendors are among the most common sources o ---  external vulnerability. From
                cloud ­service providers and IT contractors to supply chain partners and outsourced
                engineering teams, vendors routinely gain access to the internal operations o ---  a busi-
                ness. In many cases, their technical privileges exceed ­those o ---  most employees. Yet
                vendors are not subject to com­pany policies, internal training, or managerial over-
                sight. Their obligations are solely contractual. I ---  ­those contracts are vague, permis-
                sive, or ­silent, the l­egal structure collapses, and the com­pany’s trade secrets may be
                exposed without remedy.

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 143 1/12/26 2:51 PM 144 5 • Mitigating External Vulnerabilities

                            5.2.1. Limiting Vendor Rights
                               The core prob­lem in vendor relationships is not overt the --- t. It is misalignment.
                            Vendors may store con --- idential data in shared systems, retain access credentials
                            beyond the li --- e o ---  the contract, or allow subcontractors to access sensitive environ-
                            ments. ­These actions may be ordinary in the vendor’s operational model but can be
                            catastrophic  --- or trade secret protection. The vulnerability is ampli --- ied when the com­
                            pany does not monitor how its in --- ormation is handled, cannot trace which personnel
                            accessed what, or lacks exit protocols to ensure clean separation.



                                                            Digital Controls Strengthen
                                                                 Trade Secret Rights

                                                             7EDU Impact Acad­emy v. Ya You
                                                       2024 U.S. Dist. LEXIS 230110 (N.D. Cal. 2024)
                                 In a dispute between an education com­pany and a  --- ormer employee, 7EDU
                                 alleged misappropriation o ---  proprietary course materials, customer data, and
                                 business methods. The court granted a preliminary injunction,  --- inding a like-
                                 lihood o ---  trade secret protection based in part on the com­pany’s e ---

orts to control access through its digital plat — orm. The court noted that login protec- tions, document labeling, and de — ined user roles contributed to the showing o — reasonable e —


orts even though some in — ormation was shared internally and externally. The case underscores that in digital environments, plat — orm architecture and vendor con — iguration can make or break trade secret status. The court’s reasoning applies equally to current employees as well as con- tractors and vendors who access a company’s systems under de — ined digital permissions.

                               The 7EDU case illustrates how technical in --- rastructure can support l­egal claims,
                            but only i ---  it is intentional. Vendor contracts must incorporate both con --- identiality
                            obligations and operational constraints that ensure proper alignment between access
                            and accountability. A contract that governs vendor use o ---  con --- idential in --- ormation
                            must de --- ine the scope o ---  access, limit the individuals authorized to receive the in --- or-
                            mation, prohibit downstream disclosure or subcontracting, and impose  --- irm obli-
                            gations regarding return or deletion at the end o ---  the relationship. ­These terms are
                            not merely administrative. They  --- orm the structure that courts rely on to determine
                            ­whether a com­pany took reasonable steps to protect its secrets.
                              The  --- ollowing sample clause shows how companies can structure vendor access
                            obligations to reduce ­these vulnerabilities.

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 144 1/12/26 2:51 PM 5 • Mitigating External Vulnerabilities 145

                                      Vendor Access Clauses Limit Scope,
                                          Personnel, and Retention
                     “Vendor ­shall access and use Con --- idential In --- ormation solely to per --- orm the
                     ­services de --- ined in this Agreement. Vendor ­shall restrict such access to named
                      personnel approved in writing by the Com­pany, and ­shall maintain rec­ords o ---

                     all such access. Vendor ­shall not disclose or permit access to any subcontractor
                     or third party without the Com­pany’s prior written consent. Upon termination
                     or completion o ---  the ­services, Vendor ­shall promptly return or destroy all Con-

idential In — ormation in its possession, including any copies stored in backup systems or cloud environments.”

                   An e ---

ective vendor-­relationship con — identiality clause constrains access both tech- nically and or­gan­i­za­tion­ally. It re — lects a disclosing party’s interest in traceability, con- tainment, and post-­engagement closure. By speci — ying who may access in — ormation, limiting trans — er to other entities, and requiring return or destruction o — materials, the clause rein — orces secrecy with procedural en — orcement. Companies may also supple- ment this provision with periodic compliance certi — ications or system-­level audits. Some companies go — urther by requiring vendor personnel to complete internal con-


identiality or data-security training be — ore system access is granted, a practice that strengthens the record o — “reasonable measures” and ensures policy alignment across organizational boundaries. Vendor relationships, which are managed by procurement or IT teams rather than ­legal counsel, o — ten operate in the background o — business operations. But when trade secret disputes arise, ­those relationships move to the center o — litigation. Courts ­will ask what sa — eguards ­were in place to prevent misuse, what rec­ords exist to reconstruct access, and ­whether the vendor agreement adequately ­limited downstream exposure.

                5.2.2. Audit Rights and Oversight Clauses
                   Limiting access and logging usage are essential sa --- eguards, but sometimes the dis-
                closing party needs more than technical constraints. In vendor relationships where
                the in --- ormation is especially sensitive or the relationship is particularly complex,
                companies may reserve the right to audit the recipient’s practices. An audit right
                allows the trade secret ­owner to inspect how in --- ormation is handled, veri --- y compli-
                ance with con --- identiality requirements, and investigate pos­si­ble breaches. This right
                is not ­limited to suspicion. It is a tool  --- or ongoing oversight.
                   Audit clauses serve multiple purposes. They deter misuse by signaling that com-
                pliance is not merely expected but also subject to veri --- ication. They also provide
                evidence that the disclosing party took a ---

irmative steps to maintain secrecy —­ some- thing courts consider when deciding ­whether ­legal protection should apply. In some

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 145 1/12/26 2:51 PM 146 5 • Mitigating External Vulnerabilities

                            industries, audits are standard  --- or data security or regulatory compliance. But in trade
                            secret protection, they serve a distinct  --- unction: they make secrecy en --- orceable in real
                            time, not just through ­later litigation.
                               The e ---

ectiveness o — an audit clause depends on its speci — icity. Open-­ended rights to inspect “on demand” may be seen as intrusive or vague. A well-­dra — ted provision typically de — ines the audit scope, timing, notice requirements, and cooperation obli- gations. Some agreements require periodic compliance certi — ications instead o —


ull audits. ­Others limit inspection rights to business hours or restrict access to speci — ic systems or locations. The clause must strike a balance between oversight and opera- tional — easibility.

                                             Audit Clauses Provide Oversight Rights
                                                and Con --- identiality Compliance
                                 “Recipient ­shall maintain accurate and complete rec­ords regarding its ­handling
                                 o ---  the Discloser’s Con --- idential In --- ormation. Upon ten (10) business days’ writ-
                                 ten notice, and no more than twice per calendar year, Discloser may audit
                                 Recipient’s  --- acilities, systems, and relevant rec­ords to veri --- y compliance with
                                 the con --- identiality obligations in this Agreement. Recipient ­shall cooperate in
                                 good  --- aith and provide reasonable access to personnel, rec­ords, and systems
                                 necessary  --- or the audit. Discloser ­shall bear the cost o ---  such audits ­unless mate-
                                 rial noncompliance is discovered.”
                                    This clause gives the disclosing party a practical mechanism  --- or en --- orce-
                                 ment. It also imposes a recordkeeping obligation that can ­later support litiga-
                                 tion. By  --- raming the audit as a right —­ not just a reaction —­ the clause turns
                                 vigilance into structure.



                               Audit rights are especially power­ --- ul when paired with technical controls. Together,
                            they create a system o ---  external secrecy that is not only de --- ined by contract but also
                            observable in practice. When companies can monitor their vendors both through
                            plat --- orms and ­legal inspections, they trans --- orm risk into something ­measurable and,
                            more importantly, governable.


                            5.2.3. Indemnity and Liquidated
                                    Damages Clauses
                               ­Legal en --- orcement is o --- ten reactive. But in high-­risk external relationships, com-
                            panies can take a more proactive approach by assigning  --- inancial responsibility  --- or
                            trade secret loss in advance. Two tools are commonly used  --- or this purpose: indem-
                            ni --- ication and liquidated damages. They may be included in vendor contracts as well
                            as other third-­party relationships.

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 146 1/12/26 2:51 PM 5 • Mitigating External Vulnerabilities 147

                    An indemnity clause shi --- ts liability. I ---  the recipient ­causes exposure —­ by  --- ail-
                ing to comply with con --- identiality obligations, permitting unauthorized disclosure,
                or mishandling trade secrets —­ the recipient agrees to compensate the disclosing
                party  --- or resulting losses. ­These losses may include not only direct damages but also
                ­legal  --- ees, regulatory costs, and reputational harm. The clause does not replace trade
                 secret litigation. It supplements it with a contractual promise to make the disclosing
                 party ­whole.
                   A liquidated damages clause, by contrast, sets a predetermined  --- inancial conse-
                quence  --- or breach. This is particularly use --- ul where ­actual damages would be di ---

icult to prove or where the mere — act o — misappropriation could destroy the business’s competitive position. Courts ­will en — orce liquidated damages only i — the amount is reasonable and was negotiated in good — aith. Excessive or punitive — igures are likely to be rejected. ­These clauses are especially impor­tant in distribution, where trade secrets may be exposed to large numbers o — end users or incorporated into customer-­ — acing operations. I — a distributor — ails to protect con — idential sales tools, pricing models, or implementation methods, the cost o — exposure may exceed the com­pany’s direct contractual remedies. Indemnity and liquidated damages provide a second line o —

                de --- ense.



                            Indemnity and Liquidated Damages Clauses
                           Allocate Trade Secret Misappropriation Risk
                     “Recipient ­shall indemni --- y, de --- end, and hold harmless Discloser  --- rom and
                     against any and all losses, damages, liabilities, costs, and expenses (including
                     reasonable attorneys’  --- ees) arising out o ---  or related to any unauthorized use or
                     disclosure o ---  Con --- idential In --- ormation by Recipient or its agents, employees,
                     or contractors. In the event o ---  breach o ---  the con --- identiality obligations in this
                     Agreement, the parties agree that ­actual damages would be di ---

icult to deter- mine, and Recipient ­shall pay Discloser liquidated damages in the amount o —

                     $250,000, which the parties acknowledge represents a reasonable estimate o ---

                     anticipated harm.”
                        This clause combines indemnity and liquidated damages to provide both

lexibility and predictability. The indemnity captures unknown downstream costs. The liquidated amount provides a — loor — or recovery and strengthens the deterrent e —


ect o — the agreement.

                   Courts apply these same principles when evaluating real-world agreements. The
                next case shows how a liquidated damages clause  --- ailed because it resembled a penalty
                rather than a reasonable estimate o ---  loss.

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 147 1/12/26 2:51 PM 148 5 • Mitigating External Vulnerabilities

                                                            LIQUIDATED DAMAGES:
                                                        PENALTY VERSUS COMPENSATION

                                                         SIS, LLC v. Stoneridge So --- tware, Inc.,
                                             2023 U.S. App. LEXIS 748 | 2023 WL 164067 (11th Cir. 2023)
                                 A con --- identiality agreement required the breaching party to pay “all  --- orms
                                 o ---  compensation or bene --- its” it realized  --- rom the breach. Applying Georgia’s
                                 three- --- actor test, the Eleventh Circuit held the clause unen --- orceable because it
                                 operated as punishment: it measured the breacher’s gains rather than a reason-
                                 able pre-estimate o ---  the non-breacher’s probable loss. The court a ---

irmed only nominal damages despite proo — o — breach.

                               Statutory trade secret claims, however, operate independently o ---  contractual caps,
                            as shown in the next case.


                                       STATUTORY REMEDIES EXCEED CONTRACTUAL CAPS

                                                            Ingram v. Cantwell-Cleary Co., Inc.
                                                                 260 Md. App. 122 (2023)
                                 The court awarded $780,757.32 and $867,335.44 in trade secret damages under
                                 Maryland’s UTSA despite non-compete agreements that contained $50,000
                                 liquidated-damages caps. The statutory misappropriation claim was indepen-
                                 dent o ---  the contract claims, so the liquidated-damages ceiling did not limit the
                                 trade secret recovery.



                               The practical point is to dra --- t liquidated-damages clauses to address contract
                            breaches, but do not assume they cap statutory trade secret remedies. Analyze both
                            tracks in pleadings and settlement strategy.
                              Let’s now address the second identi --- ied gap: indemnity and liquidated damages
                            provisions in external relationships.
                               ­These clauses are not about secrecy per se —­ they are about consequences. When
                            trade secrets are disclosed to vendors, distributors, or development partners, the dis-
                            closing party may want to shi --- t the  --- inancial risk o ---  exposure through contract. I ---

                            the recipient mishandles the in --- ormation,  --- ails to  --- ollow procedures, or ­causes leak-
                            age —­ ­whether negligently or through breach —­ the disclosing party can seek compen-
                            sation ­under an indemni --- ication clause or pre-­agreed payment ­under a liquidated
                            damages clause.

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 148 1/12/26 2:51 PM 5 • Mitigating External Vulnerabilities 149

                   ­These tools are especially use --- ul in settings where ­actual damages may be hard to
                quanti --- y or where a dispute could impose costs beyond the trade secret itsel --- , such as
                regulatory penalties, customer churn, or loss o ---  investor con --- idence.



                            5.3. Collaborative Development:
                           Blurred Bound­aries and Owner­ship
                                       Con --- usion
                   When companies work together to develop new technologies, pro­cesses, or
                products, the resulting innovation o --- ten re --- lects the input o ---  both parties. ­These
                collaborations can generate enormous value, but they also create deep structural vul-
                nerabilities. The most signi --- icant o ---  ­these is uncertainty about owner­ship. A com­pany
                may contribute proprietary know-­how to a proj­ect ­under the belie ---  that it remains
                the exclusive ­owner while its partner believes the resulting insights are jointly held or

reely usable. Without clear contractual delineation, courts may strug­gle to determine ­whether any trade secret rights remain intact. This vulnerability is distinct — rom the — t. The danger in collaborative development is not misappropriation by outsiders but rather ambiguity between partners. That ambiguity can arise at multiple levels: ­whether the disclosing party retains rights in its background technology, ­whether new in — ormation is considered jointly owned or subject to separate con — identiality obligations, and ­whether ­either party may use the in — ormation ­a — ter the collaboration ends. In many cases, courts are — orced to recon- struct the parties’ expectations — rom in — ormal communications and vague contracts, with mixed and unpredictable results.

                           De --- ining Bound­aries Preserves Trade Secret
                                     Rights in Collaboration

                                     Altavion, Inc. v. Konica Minolta Systems Laboratory, Inc.
                                                    226 Cal. App. 4th 26 (2014)
                     Altavion developed a method  --- or embedding secure digital barcodes into docu-
                     ments and disclosed it to Konica Minolta  --- or potential integration into Konica’s
                     products. Although the parties operated ­under a con --- identiality agreement,
                     no development deal was  --- inalized. Konica Minolta l­ater  --- iled patent applica-
                     tions covering the same concepts. The Cali --- ornia Court o ---  Appeal ruled that
                     Altavion had alleged a valid trade secret misappropriation claim, emphasizing
                     that the in --- ormation was technical in nature, disclosed in con --- idence, and not

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 149 1/12/26 2:51 PM 150 5 • Mitigating External Vulnerabilities

                                 generally known. The decision turned in part on the absence o ---  any agreement
                                 trans --- erring owner­ship or permitting such use. The court rejected the argu-
                                 ment that technical ideas must be reduced to physical  --- orm to be protected,
                                 underscoring that early-­stage collaboration does not justi --- y appropriation
                                 without permission.



                               The Altavion case illustrates a common scenario. A smaller com­pany shares a
                            technical concept with a larger prospective partner, hoping  --- or a joint venture or
                            integration. No deal is  --- inalized, but the larger com­pany moves  --- orward with a simi-
                            lar product or patent. I ---  the contract does not clearly state that shared in --- ormation
                            remains the property o ---  the disclosing party and cannot be used absent  --- urther agree-
                            ment, the l­egal consequences may depend on how courts interpret the relationship.
                            In Altavion, the court sided with the discloser. In other cases, the absence o ---  de --- ined
                            bound­aries may lead to the opposite result.
                               To mitigate t­hese vulnerabilities, companies entering into joint development
                            arrangements must clearly distinguish three categories o ---  intellectual property: back-
                            ground IP (what each party brings to the ­table), resulting IP (what is developed dur-
                            ing the collaboration), and residual or derivative knowledge (what individuals retain
                            or repurpose ­a --- ter the proj­ect ends). Each o ---  ­these must be de --- ined in the contract,
                            along with speci --- ic rules governing owner­ship, use, and post-­termination rights.



                                               Owner­ship Clauses Preserve Rights in
                                                   Joint-­D evelopment Proj­ects
                                 “Each party ­shall retain all right, title, and interest in and to its Background
                                 IP. Except as expressly provided in this Agreement, nothing herein ­shall be
                                 construed to grant any rights or licenses to the other party’s Background IP.
                                 Any Resulting IP developed in the course o ---  the collaboration ­shall be jointly
                                 owned ­unless other­wise agreed in writing. The parties ­shall negotiate in good

aith any commercialization terms prior to use o — Resulting IP outside the scope o — this Agreement.” This clause preserves preexisting rights, allocates shared rights in joint outputs, and — lags the need — or — urther negotiation be — ore broader commer- cialization. More sophisticated versions may assign resulting IP based on con- tribution or include license-­back mechanisms.

                               Even when owner­ship is clear, the contract must also address how trade secrets may
                            be used during and ­a --- ter the collaboration. Use restrictions are essential to prevent a
                            partner  --- rom taking con --- idential in --- ormation, embedding it in a separate proj­ect, and

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 150 1/12/26 2:51 PM 5 • Mitigating External Vulnerabilities 151

               claiming i­ndependent development or mutual license. The next subsection explores
               how courts have evaluated such use, particularly in cases where the proj­ect ends with-
               out a  --- ormal agreement or proceeds in --- ormally based on goodwill.


               5.3.1. Use Restrictions in Joint Development
                   Collaborative proj­ects o --- ten begin in a spirit o ---  openness. The parties may share engi-
                neering speci --- ications, design concepts, technical drawings, or early-­stage code ­under
               the assumption that mutual bene --- it ­will  --- ollow. But when the relationship ends—­ ­whether
               through termination, non-­renewal, or a ­simple lack o ---  pro­gress —­ the question becomes
               ­whether t­hose shared materials may still be used. I ---  the contract does not include
                en --- orceable use restrictions, a party may repurpose what it has learned and argue that
                the disclosing party implicitly authorized that use by participating in the proj­ect.
                  This vulnerability is especially dangerous when a com­pany contributes trade secrets
               to a collaboration that ultimately bene --- its the other party more than itsel --- . Without use
               restrictions, the contributing party may lose control not only over the in --- ormation but
               also over its competitive position. Courts are reluctant to imply limitations that ­were
               not expressed, even where the  --- acts suggest an imbalance in outcome. That makes
               express language essential.


                              Express Use Restrictions Preserve Trade
                              Secret Rights ­A --- ter Collaboration Ends

                                                      C3.ai Inc. v. Cummins, Inc.
                                                   2024 Del. Super. LEXIS 622 (2024)
                   C3.ai entered into a ­pilot proj­ect with Cummins to develop arti --- icial intelligence
                   tools  --- or  --- uel optimization. ­A --- ter the collaboration ended, Cummins launched
                   a similar product. C3.ai alleged that Cummins had used trade secrets disclosed
                   during the partnership. The court denied Cummins’s motion to dismiss,  --- ind-
                   ing that C3.ai had plausibly alleged the in --- ormation was shared in con --- idence,
                   subject to use restrictions, and not intended  --- or general application. The case
                   illustrates that courts ­will en --- orce use limitations even ­a --- ter a proj­ect ends —­ i ---

                   the parties structured their relationship with enough speci --- icity.



                  The C3.ai case demonstrates that disclosing parties do not lose their rights when
               a proj­ect ends, although they must be able to prove that the in --- ormation was subject
               to continued protection. A general con --- identiality clause may be insu ---

icient ­unless it includes limits on how the in — ormation may be used, by whom, and — or what purpose. The more valuable and technical the trade secret, the more impor­tant it is to restrict derivative use.

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 151 1/12/26 2:51 PM 152 5 • Mitigating External Vulnerabilities

                                          Use Restriction Clauses Limit Applications
                                                     Outside the Proj­ect
                                 “Recipient ­shall use the Discloser’s Con --- idential In --- ormation solely  --- or pur-
                                 poses o ---  per --- orming ­under this Agreement. Recipient ­shall not use such in --- or-
                                 mation to develop, test, commercialize, or support any product or s­ervice
                                 outside the scope o ---  the collaboration, ­either directly or through any a ---

iliate or third party, without Discloser’s prior written consent.” This clause limits both commercial and developmental uses, constrain- ing in — ormation to the agreed context. It also bars derivative use through related entities. Companies concerned about overreach may — urther require documentation o — all internal recipients and impose deletion requirements post-­termination.

                               When contracts lack such restrictions, courts may look to circumstantial evidence:
                            how the parties behaved, what emails or meeting notes re --- lect, and ­whether ­there was
                            a shared understanding o ---  purpose. But reliance on in --- erence introduces uncertainty.
                            A clearly dra --- ted use clause eliminates that uncertainty and strengthens the disclosing
                            party’s position. The next section turns to what happens ­a --- ter a proj­ect ends: ­whether
                            and how the trade secrets shared during the collaboration must be returned, deleted,
                            or other­wise withdrawn  --- rom use.


                            5.3.2. Return and Destruction Obligations
                                    at Termination
                               When a collaboration ends, the disclosing party must act to reestablish exclusive
                            control over its trade secrets. I ---  con --- idential in --- ormation remains in the possession o ---  a

ormer partner —­ ­whether stored on servers, embedded in dra — ts, or circulating among team members —­ the risk o — unintended use persists. Courts evaluating trade secret claims o — ten — ocus on ­whether the disclosing party took steps to secure the in — orma- tion ­a — ter the relationship ended. A — ailure to demand return or destruction can sug- gest abandonment or waiver, even i — ­there was no intent to relinquish protection. The vulnerability ­here is temporal. Many agreements include con — identiality obli- gations that expire ­a — ter a — ixed period. ­Others require nondisclosure but say nothing about what must happen to the in — ormation at the end o — the deal. In some cases, a partner continues using in — ormation it acquired during the relationship ­under the assumption that it has some residual license. Courts are unlikely to supply stricter protections than the contract provides. It is the responsibility o — the disclosing party to ensure that the exit terms support ongoing secrecy.

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 152 1/12/26 2:51 PM 5 • Mitigating External Vulnerabilities 153

                                Failure to Formalize Return Obligations
                                     Limits Trade Secret Protection

                                                      Bianco v. Globus Medical, Inc.
                                                    30 F. Supp. 3d 565 (E.D. Tex. 2014)
                     Dr. Bianco, a spinal surgeon, disclosed a concept  --- or an intervertebral  --- usion
                     device to Globus Medical during discussions about potential collaboration.
                     Globus went on to commercialize a similar product without entering into a  --- or-
                     mal development agreement or returning any o ---  the in --- ormation provided. The
                     court  --- ound that Bianco had disclosed protectable trade secrets in con --- idence
                     and that Globus had misappropriated them. However, the absence o ---  clear
                     documentation regarding post-­engagement ­handling complicated the assess-
                     ment o ---  damages and scope. The case shows how  --- ailure to establish return or
                     destruction obligations can undermine trade secret en --- orcement, even when
                     misappropriation is proven.



                   The Bianco case re --- lects a broader pattern. In --- ormal relationships and early-­stage
                discussions o --- ten involve the exchange o ---  valuable in --- ormation without clear terms
                about what happens when t­hose discussions end. A com­pany that discloses trade
                secrets in this context must assume that the de --- ault outcome is that the in --- ormation
                remains in the recipient’s possession ­unless other­wise stated. To preserve protection,
                the agreement should include a mandatory exit procedure and require written certi-

ication that all materials have been removed or returned.

                                      Return and Destruction Clauses
                                    Provide End-­o  --- -­Project Protocols  --- or
                                          Con --- idential In --- ormation
                     “Upon expiration or termination o ---  this Agreement, Recipient ­shall promptly
                     return or securely destroy all Con --- idential In --- ormation received  --- rom Dis-
                     closer, including all copies, extracts, and derivative materials. Upon request,
                     Recipient ­shall certi --- y in writing that it has complied with ­these obligations.
                     This provision ­shall survive the termination o ---  the Agreement.”
                         This clause establishes a clear obligation to eliminate retained materials and
                     provides a mechanism  --- or veri --- ication. While en --- orcement may still depend
                     on practical cooperation, the existence o ---  a certi --- ication requirement creates a
                     l­egal hook  --- or demanding compliance and strengthens the disclosing party’s
                      position in any ­later dispute.

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 153 1/12/26 2:51 PM 154 5 • Mitigating External Vulnerabilities

                               Without ­these mechanisms, companies expose their trade secrets to quiet appro-
                            priation. Even a partner acting in good  --- aith may retain materials in backups, internal
                            wikis, or team notes that ­later in --- luence new proj­ects. Trade secret protection depends
                            not only on initial disclosure discipline but on exit discipline as well. The next sec-
                            tion examines a di --- ­ --- er­ent type o ---  vulnerability: disclosures made to customers, where
                            exposure can occur through reverse engineering or insu ---

icient restriction during product evaluation.

                                             5.4. Customer Disclosures:
                                          Evaluation, Exposure, and Reverse
                                                     Engineering
                                Customer relationships o --- ten require companies to reveal the very in --- ormation
                            they seek to protect. Demonstrations, ­pilot programs, and evaluation licenses are
                            common  --- eatures o ---  enterprise sales, especially when the product involves techni-
                            cal complexity or integration with customer systems. In ­these settings, companies
                            may grant access to source code, design speci --- ications, ­per --- ormance data, or even live
                            environments. But customer-­ --- acing disclosures are uniquely dangerous. The com­pany
                            disclosing the in --- ormation has no control over how the customer stores it, who sees
                            it, or how long it persists in internal systems. Without a care --- ully designed structure,
                            the trade secret may not survive the sales ­process.
                               The vulnerability ­here is two --- old. First, trade secrets can be lost through law --- ul
                            reverse engineering. I ---  a customer receives a product and t­here is no contractual
                            restriction on analy­sis, disassembly, or replication, then reverse engineering is a per-
                            mitted means o ---  discovery. In that case, even the most valuable design or ­process loses
                            protection —­ not ­because the customer misbehaved, but ­because the disclosing com­
                            pany  --- ailed to impose en --- orceable limits. Courts routinely uphold reverse engineering
                            as a legitimate pathway to in --- ormation ­unless clearly prohibited.
                                 Second, even where reverse engineering does not occur, the absence o ---  clear evalu-
                            ation terms can create con --- usion about permissible use. A customer may believe it
                            is ­ --- ree to retain a demo device, continue using sample data, or adapt the disclosed

eatures into its own pro­cesses. I — the contract does not de — ine the limits o — use, ­these assumptions may go unchallenged. Trade secret law requires a —


irmative steps to pre- serve secrecy. It does not shield companies — rom the consequences o — ambiguity.

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 154 1/12/26 2:51 PM 5 • Mitigating External Vulnerabilities 155

                                    No-­Reverse-­Engineering Clauses Can
                                           Protect Trade Secrets

                                             Accent Packaging, Inc. v. Leggett & Platt, Inc.
                                                    707 F.3d 1318 (Fed. Cir. 2013)
                     Accent Packaging developed a bale tie machine and alleged that Leggett & Platt
                     acquired a sample product, reverse engineered it, and began selling a similar
                     device. Accent argued that its design constituted a trade secret. The court dis-
                     agreed, holding that ­because Leggett & Platt obtained the machine law --- ully and
                     no contract restricted analy­sis, reverse engineering was a permissible means o ---

                     discovery. The decision rein --- orces that trade secrets do not shield in --- ormation
                     that can be acquired through law --- ul reverse engineering —­ ­unless an en --- orce-
                     able agreement says other­wise.



                   The lesson  --- rom Accent Packaging and many similar cases is not that reverse engi-
                neering is inevitable but rather that companies must act a ---

irmatively to prevent it. Contracts can impose en — orceable limits on analy­sis, but ­those terms must be writ- ten clearly and agreed to be — ore disclosure. Boilerplate con — identiality provisions are unlikely to su —


ice. Courts generally treat reverse engineering prohibitions as distinct


rom ordinary nondisclosure terms. The structure o — the evaluation ­matters just as much as the contract. Companies should consider how in — ormation is delivered, ­whether digital access can be time-­ limited, and ­whether logs can veri — y what was viewed or downloaded. I — so — tware is involved, code may be ob — uscated or hosted on secure servers with monitored user sessions. I — hardware is involved, sample products should be retrieved or disabled ­a — ter the evaluation ends. ­These operational details strengthen the argument that secrecy was preserved. To support ­these e —


orts, evaluation agreements should include narrow use restric- tions, explicit bans on reverse engineering, and clear obligations to return or delete all materials. The — ollowing clause re — lects ­these ele­ments.

                                        Evaluation Clauses Limit Use and
                                          Prohibit Reverse Engineering
                     “Recipient ­shall use the Evaluation Materials solely  --- or the purpose o ---  internal
                     evaluation and ­shall not reverse engineer, decompile, disassemble, or other­
                     wise attempt to derive the under­lying structure,  --- unction, or design. Recipient
                     ­shall not use the Evaluation Materials  --- or any commercial, developmental, or

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 155 1/12/26 2:51 PM 156 5 • Mitigating External Vulnerabilities

                                 comparative purpose. All materials ­shall be returned or deleted upon comple-
                                 tion o ---  the evaluation period.”
                                    This clause preserves the ability to engage potential customers while ensur-
                                 ing that the scope o ---  use is ­limited. By restricting reverse engineering and com-
                                 mercial application, the disclosing party protects against loss o ---  secrecy during
                                 a legitimate business ­process. The return obligation rein --- orces the temporary
                                 nature o ---  the access.



                                General restrictions, while use --- ul, must be supplemented by documentation and
                            en --- orcement. A com­pany should track what was shared,  --- or how long, and with whom.
                            It should  --- ollow up at the end o ---  the trial period to request return or destruction. I ---  ­these
                            steps are not taken, a court may ­later  --- ind that the disclosing party  --- ailed to maintain
                            secrecy —­ even i ---  the customer acts in ways the com­pany never intended or  --- oresaw.
                               Customer access cannot be treated as a casual transaction. When trade secrets are
                            involved, even routine sales activities must be governed by structured agreements
                            and thought --- ul delivery mechanisms. Other­wise, the pursuit o ---  new business can
                            become the pathway to irreversible loss. The next section turns to distribution rela-
                            tionships, where the challenge is not evaluation but control over in --- ormation that
                            passes through intermediaries and into broader markets.



                                         5.5. Distribution Relationships and
                                                  Downstream Risk
                                Trade secrets o --- ten move beyond the original transaction. When companies rely on
                             distributors, licensees, or channel partners to deliver products and ­services, con --- iden-
                             tial in --- ormation can travel  --- urther than anticipated. ­These relationships enable com-
                             mercial growth, but they also expose trade secrets to indirect loss. The disclosing party
                             may not know how many hands its in --- ormation passes through, what systems are used
                             to store it, or ­whether the agreed restrictions are understood by every­one with access.
                            ­These vulnerabilities must be addressed both contractually and structurally. This sec-
                             tion examines three speci --- ic risks in distribution: in --- ormal relationships without ­legal
                             protection, uncontrolled downstream propagation, and post-­termination retention.


                            5.5.1. In --- ormal Channels and the
                                    Absence o ---  Control
                               Distribution o --- ten begins in --- ormally. A promising business opportunity emerges,
                            and in --- ormation is shared to support negotiations or initial rollout. Documenta-
                            tion may come l­ater, i ---  at all. But when trade secrets are disclosed without a signed

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 156 1/12/26 2:51 PM 5 • Mitigating External Vulnerabilities 157

                agreement or with only vague terms in place, protection is rarely available. Courts
                evaluating misappropriation claims look not only at what was shared but also at how
                it was shared. I ---  the disclosing party cannot show that it took clear and deliberate steps
                to impose con --- identiality, the in --- ormation may be treated as  --- or --- eited.
                   This is especially true in joint venture discussions, regional distribution negotia-
                tions, or exploratory sales channel arrangements. Companies may provide business
                plans, marketing strategies, pricing models, or product designs without realizing that,
                absent a  --- ormal structure, ­these materials become unprotected once disclosed.


                               Contract  --- or Con --- identiality to Protect
                                         Shared In --- ormation

                                           Auto Channel, Inc. v. Speedvision Network, LLC
                                                144 F. Supp. 2d 784 (W.D. Ky. 2001)
                     Auto Channel disclosed business plans, programming strategies, and market-
                     ing ideas to Speedvision while discussing a pos­si­ble joint venture. No nondis-
                     closure agreement was signed. Speedvision l­ater launched a similar network,
                     and Auto Channel sued  --- or trade secret misappropriation. The court rejected
                     the claim, holding that Auto Channel had not taken reasonable steps to main-
                     tain secrecy. Without any written agreement or  --- ormal controls, the in --- orma-
                     tion was not protected. The court did not question the value or originality o ---

                     the content but instead  --- ocused entirely on the lack o ---  structural sa --- eguards.



                   What makes Auto Channel notable is not the  --- acts, which are common, but the clar-
                ity with which the court dismissed the claim. Even highly sensitive commercial
                in --- ormation cannot quali --- y as a trade secret i ---  the ­owner treats it casually. In --- ormal
                relationships, even with trusted partners, are not an excuse. They are a vulnerability.


                5.5.2. Downstream Propagation and
                       Sub-­Agent Risk
                   Even where a distribution agreement is in place, prob­lems arise when the contract
                protects the in --- ormation only in the hands o ---  the primary recipient. Many distributors
                operate through agents, subcontractors, or localized partners. ­These sub-­agents o --- ten
                per --- orm customer-­ --- acing work and receive access to trade secrets, but they may not be
                bound by the same contractual terms as the original distributor. I ---  the agreement  --- ails
                to impose  --- low-­down obligations, the disclosing com­pany has l­ittle basis to pursue
                en --- orcement when the in --- ormation leaks beyond the  --- irst layer.
                   The risk is not always malice. In many cases, a distributor shares materials with
                other actors  --- or operational reasons. A training manual is  --- orwarded to a ­service

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 157 1/12/26 2:51 PM 158 5 • Mitigating External Vulnerabilities

                            partner. A con --- idential con --- iguration tool is installed by a subcontractor. A support
                            engineer uses internal documentation to answer customer questions. Without clear
                            contractual rules, ­these actions may  --- all outside the scope o ---  protection. Courts ­will
                            not presume that con --- identiality extends automatically.
                               To prevent this kind o ---  exposure, contracts must require the distributor to bind all
                            personnel and sub-­entities to equivalent obligations. The language must be speci --- ic,
                            en --- orceable, and durable.


                                            Channel Con --- identiality Clauses Impose
                                                   Flow-­D own Obligations
                                 “Distributor ­shall maintain the con --- identiality o ---  all Con --- idential In --- ormation
                                 provided ­under this Agreement and ­shall not disclose such in --- ormation to any
                                 third party without the prior written consent o ---  the Com­pany. Distributor ­shall
                                 ensure that all employees, agents, contractors, and sub-­distributors who access
                                 Con --- idential In --- ormation are bound by written con --- identiality obligations no
                                 less restrictive than ­those set  --- orth herein. ­These obligations ­shall survive the
                                 termination or expiration o ---  this Agreement.”
                                    This clause ensures that the obligations do not end with the primary party. It
                                 closes the downstream gap and creates an en --- orceable  --- ramework  --- or holding
                                 third-­level recipients accountable.



                                It is common and sensible to pair a channel ( --- low-down) con --- identiality clause with
                            indemni --- ication  --- or downstream breaches and, where appropriate, a liquidated-dam-
                            ages  --- loor. So long as each piece is dra --- ted cleanly and the liquidated damages amount
                            is a reasonable pre-estimate o ---  loss (not a penalty), courts will generally en --- orce these
                            provisions in tandem.
                              A  --- low-­down clause is not a  --- ormality. It is the only l­egal tool available to extend
                            protection beyond the initial handshake. In distribution, in --- ormation moves. The
                            contract must  --- ollow it.


                            5.5.3. Termination and Retained Access
                               One o ---  the most per­sis­tent threats in distribution is what happens ­a --- ter the rela-
                            tionship ends. Distributors o --- ten retain physical or digital materials containing trade
                            secrets. ­These may include technical documentation, training resources, implementa-
                            tion tools, or customer data. I ---  the contract does not require return or deletion, and i ---

                            systems do not en --- orce revocation, the trade secret remains outside the control o ---  its
                            ­owner. Over time, that exposure undermines both secrecy and en --- orceability.
                              This prob­lem is structural, not behavioral. Even a distributor acting in good  --- aith
                            may retain protected in --- ormation simply ­because no one asked  --- or it back. Courts

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 158 1/12/26 2:51 PM 5 • Mitigating External Vulnerabilities 159

                evaluating ­these situations want to see evidence that the disclosing party took a ---

irma- tive steps to reclaim or disable access. I — nothing in the contract requires it, and i — the com­pany cannot prove what was done at the end o — the relationship, the trade secret may be deemed abandoned. The solution is to treat termination as a ­process, not an event. Agreements should mandate the return or destruction o — all materials and require written con — irmation. Companies should also implement system-­level controls to revoke login credentials, remove shared — iles, and disable support portals as part o — their o —


boarding ­process. I —

                ­these steps are taken promptly and documented, the ­owner strengthens its ­legal claim
                 that secrecy was preserved.
                   Distribution expands a com­pany’s reach. But ­every new hand that touches a trade
                secret must be governed. When contracts are written with this real­ity in mind, the
                risks o ---  indirect disclosure become manageable. When they are not, the ­legal conse-
                quences can be swi --- t and irreversible.




                               5.6. Architectural Sa --- eguards and
                                  System-­Level En --- orcement
                   ­Legal agreements de --- ine the bound­aries o ---  con --- identiality, but t­hose bound­aries
                must be re --- lected in the way in --- ormation is actually handled. Trade secret law does not
                protect in --- ormation in theory. It protects in --- ormation that is actively and consistently
                kept secret. System architecture plays a critical role in meeting that standard. When
                trade secrets are shared with external parties, protection depends not only on what the
                contract says but also on how access is managed, monitored, and ultimately revoked.
                   System-­level sa --- eguards are not a substitute  --- or ­legal obligations, but they are o --- ten
                the clearest evidence that a com­pany took its obligations seriously. Courts regularly
                ask ­whether the disclosing party l­imited access, tracked usage, and retained control
                over who could see what. I ---  a com­pany can answer ­those questions with documenta-
                tion and precision, its position is strengthened. I ---  it cannot, no amount o ---  contractual
                language ­will rescue the claim.
                   Access segmentation is one o ---  the most e ---

ective tools — or external secrecy. Instead o — providing — ull access to a partner or vendor, companies should isolate the speci — ic in — ormation necessary — or the task and provide access only to that subset. This can be implemented through secure data rooms, password-­protected — olders, user-­speci — ic permissions, or cloud environments that allow time-­limited access. Segmentation supports the argument that the com­pany shared the in — ormation strategically and did not expose its — ull knowledge base. Monitoring is the next layer o — protection. A system that rec­ords who accessed which


iles, when they ­were viewed, and ­whether they ­were copied or trans — erred provides both deterrence and proo — . ­These logs can reveal patterns o — overuse, unauthorized

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 159 1/12/26 2:51 PM 160 5 • Mitigating External Vulnerabilities

                            be­hav­ior, or data ex --- iltration. They also allow the com­pany to respond in real time i ---

                            something goes wrong. Without monitoring, a com­pany may be unaware that a trade
                            secret has already le --- t its control.
                                ­These architectural ele­ments ­matter most when the relationship ends. I ---  a system
                            allows the recipient to continue accessing shared in --- ormation ­a --- ter termination, or i ---

iles remain in shared drives with no expiration mechanism, the com­pany has likely


ailed to maintain secrecy. Revoking access, deleting shared accounts, and requiring con — irmation o — deletion are essential steps in restoring control.

                                                      Control and Monitor Access to
                                                          Protect Trade Secrets

                                                            GlobeRanger Corp. v. So --- tware AG USA, Inc.
                                                                   836 F.3d 477 (5th Cir. 2016)
                                 GlobeRanger entered into a reseller relationship with So --- tware AG involving
                                 proprietary middleware technology. Although the contract included con --- i-
                                 dentiality terms, the com­pany  --- ailed to implement clear technical sa --- eguards.
                                 Employees across both ­organizations had access to the in --- ormation, and
                                 GlobeRanger did not restrict retention or monitor usage. When So --- tware AG
                                 began developing similar technology, GlobeRanger sued  --- or misappropriation.
                                 The court allowed the claim to proceed, but it noted that the absence o ---  consis-
                                 tent access controls and monitoring made it harder to show that GlobeRanger
                                 had taken reasonable steps to preserve secrecy. The result was a weakened case
                                 that might have been stronger i ---  architectural sa --- eguards had been in place.



                                The court’s comments in GlobeRanger re --- lect a broader truth. Reasonable e ---

orts are not ­measured solely by intention. They are ­measured by the totality o — the system. When companies share in — ormation without knowing how it ­will be used, where it ­will be stored, or who ­will have access to it, they place their rights at risk. When they instead build secure channels, de — ine access ­parameters, and maintain a rec­ord o —

                             what was done, they convert ­legal theory into en --- orceable real­ity.
                              ­These princi­ples can be rein --- orced through contract, but they are most e ---

ective when supported by design. The — ollowing clause shows how to align l­egal commit- ments with system-­level en — orcement.

                                            Access and Monitoring Clauses Mandate
                                                Integrated Technical Controls
                                 “Recipient s­hall access Con --- idential In --- ormation only through systems
                                 designated by the Discloser. Such systems may include secure data rooms,

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 160 1/12/26 2:51 PM 5 • Mitigating External Vulnerabilities 161

                     credentialed portals, or other plat --- orms subject to access logging and usage
                     monitoring. Recipient s­hall not disable, bypass, or other­wise inter --- ere with
                     ­these controls. Upon expiration or termination o ---  this Agreement, access cre-
                      dentials ­shall be revoked and all Con --- idential In --- ormation ­shall be returned or
                     securely deleted.”
                         This clause does more than impose a l­egal duty. It anticipates a technical
                     ­process. By aligning the contract with the plat --- orm through which in --- orma-
                     tion is delivered, the com­pany creates a de --- ensible rec­ord o ---  how secrecy was
                      preserved.


                   System architecture is not always vis­i­ble. But when trade secrets are shared exter-
                nally, it becomes central. A com­pany’s ability to track, limit, and withdraw access
                re --- lects its commitment to secrecy. Without ­those capabilities, protection becomes
                speculative. The  --- inal section o ---  this chapter o ---

ers a synthesis o — ­these lessons and shows how contract and architecture must work together to support containment and control.

                                              5.7. Cybersecurity and
                                              Trade Secret Exposure
                   Trade secret protection increasingly depends on the strength o ---  an ­organization’s
                digital in --- rastructure. In a world where con --- idential in --- ormation is stored in cloud
                environments, accessed through vendor portals, and transmitted across global net-
                works, cybersecurity is no longer just a technical issue. It is a ­legal one. Courts evalu-
                ating ­whether a com­pany took reasonable steps to maintain secrecy do not look only
                at employment agreements or nondisclosure provisions. They also examine system
                architecture, access control, encryption practices, and the ability to detect and contain
                unauthorized use.
                    This chapter has already shown how contracts, work --- lows, and technical sa --- e-
                guards can help protect trade secrets when in --- ormation is shared externally. But even
                well-­dra --- ted agreements can be undone by insecure con --- igurations, poorly monitored
                integrations, or shared credentials that outlive the relationship. The most disciplined
                ­legal  --- ramework cannot overcome the  --- ailures to revoke access ­a --- ter termination, seg-
                 ment user privileges, or monitor who views sensitive data. In cybersecurity, expo-
                 sure is not always intentional. Sometimes it results  --- rom indi ---

erence, legacy systems, or an unclear division o — responsibility between parties. But trade secret law does not distinguish between accidental and deliberate — ailure. The standard is e —


ort. The benchmark is control. Cybersecurity vulnerabilities also introduce en — orcement complexity. A com­pany that cannot prove when in — ormation le — t its control or who had access to it may lose

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 161 1/12/26 2:51 PM 162 5 • Mitigating External Vulnerabilities

                            not ­because it lacks a valid claim but ­because it lacks evidence. That evidentiary gap
                            becomes a l­egal  --- ailure. The solution is not simply to invest in technology but also
                            to align ­legal and technical controls. Contracts must re --- lect how systems are con --- ig-
                            ured. System logs must support contractual claims. Termination procedures must be
                            executed both on paper and in the cloud.
                               The subsections that  --- ollow examine the speci --- ic ways in which cybersecurity  --- ail-
                            ures create ­legal vulnerability. They address per­sis­tent access credentials, API integra-
                            tions, multi-­tenant cloud storage, en --- orceable security obligations, incident response,
                            and containment strategies. Each re --- lects a ­simple premise: secrecy cannot survive in
                            ungoverned digital environments. Where systems are porous, the law may presume
                            waiver. Where they are structured, secrecy becomes de --- ensible. The line between
                            technical con --- iguration and l­egal protection is no longer theoretical. It is the battle-
                            ground  --- or modern trade secret en --- orcement.


                            5.7.1. Per­sis­tent Access and Credential
                                    Mismanagement
                               One o ---  the most overlooked ­causes o ---  trade secret exposure is the  --- ailure to revoke
                            access. When employees, vendors, or collaborators are given credentials to access
                            con --- idential in --- ormation, t­hose credentials o --- ten outlive the relationship. A termi-
                            nated contractor may retain access to a shared  --- older. A  --- ormer vendor may still have
                            administrative rights to a cloud plat --- orm. An internal user who has shi --- ted roles may
                            continue to hold read-­write access to systems that no longer concern them. ­These
                            gaps are not unusual. But they are dangerous.
                               Per­sis­
                                      tent credentials create structural vulnerability. Courts have repeatedly
                            emphasized that trade secrets must be subject to ongoing control. I ---  in --- ormation
                            remains accessible to individuals who are no longer authorized to receive it, or i ---  the
                            com­pany cannot document who has what level o ---  access, it becomes di ---

icult to claim that the in — ormation was kept secret. This — ailure is not merely technical. It is ­legal. When companies cannot terminate access promptly and veri — y that access has in — act been terminated, they compromise their ability to prove reasonable e —


orts. The prob­lem o — ten arises in external relationships, where access is shared across ­organizations. A customer support partner may be given login credentials to a ­service plat — orm. A development vendor may receive access to a private repository. A sales agent may be issued a device containing preloaded pricing tools. In each case, the disclosing party must retain the ability to revoke access centrally and con — irm that it has been revoked. In — ormal arrangements, shared credentials, and decentralized access management systems all create traceability — ailures. And without traceability, secrecy cannot be en — orced. The l­egal response to this risk is two — old. First, companies must treat credential issuance and revocation as ­legal events, not just IT procedures. User access should be mapped to contractual terms and controlled through account provisioning systems

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 162 1/12/26 2:51 PM 5 • Mitigating External Vulnerabilities 163

                that can generate logs, revoke permissions, and veri --- y deletion. Second, agreements
                should require the recipient to cooperate in credential revocation and con --- irm com-
                pliance. Where credentials are shared across teams or embedded in work --- lows, com-
                panies may need to demand periodic access audits and deactivation reports.


                             Credential Revocation Clauses Govern
                         Termination o ---  Access Upon Employee Separation
                                     or Proj­e ct Conclusion
                     “Recipient s­hall ensure that all credentials, login in --- ormation, and system
                     access rights granted in connection with this Agreement are revoked immedi-
                     ately upon termination o ---  the relationship or the reassignment o ---  personnel no
                     longer requiring access. Recipient ­shall cooperate in veri --- ying that such revo-
                     cations have occurred and ­shall provide written con --- irmation upon request.
                     Continued access to Con --- idential In --- ormation  --- ollowing termination ­shall con-
                     stitute a material breach o ---  this Agreement.”
                        This clause trans --- orms access management into a l­egal obligation. It also
                     establishes non-­revocation as breach —­ thus ensuring that  --- orgotten credentials
                     carry en --- orceable consequences.



                     Credential mismanagement is not a rare  --- ailure. It is a daily real­ity in many
                ­organizations, especially where IT  --- unctions are siloed  --- rom ­legal operations. But  --- or
                 trade secrets to remain protected, access must be closed when the relationship ends.
                 I ---  not, a door is le --- t open, and the law may treat it as an invitation.


                5.7.2. API Access and Embedded Data Flows
                    Modern collaboration o --- ten occurs not through shared  --- iles but through so --- tware
                integrations. Trade secrets may be accessed, pro­cessed, or transmitted via application
                programming inter --- aces, or APIs, that link systems across companies. ­These integra-
                tions are o --- ten invisible once con --- igured. Data  --- lows continuously, sometimes in real
                time,  --- rom one environment to another. The technical ­convenience o ---  APIs intro-
                duces a ­legal risk: trade secrets may pass through an external system without adequate
                documentation, restriction, or monitoring. I ---  that happens, secrecy may be lost even
                i ---  the in --- ormation never appears on a screen.
                   The vulnerability ­here lies in scope. Many API relationships are structured quickly,
                especially in ­pilot proj­ects or customer ­trials. An engineer may enable access to test
                data or internal  --- unctionality on the assumption that the integration ­will be l­imited.
                But the API may expose more than intended by allowing external users to query,
                copy, or store protected data without triggering alarms. Worse, i ---  the integration
                remains active ­a --- ter the proj­ect ends, the recipient may continue accessing con --- idential

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 163 1/12/26 2:51 PM 164 5 • Mitigating External Vulnerabilities

                            materials in­de --- ­initely. This can occur without new credentials or intentional miscon-
                            duct. It happens ­because the in --- ormation was never clearly  --- enced.
                               Trade secret law does not distinguish between vis­i­ble and invisible disclosures.
                            I ---  a com­pany enables external access to protected in --- ormation through an API and
                            does not limit that access through contract and con --- iguration, the com­pany may be
                            deemed to have abandoned secrecy. Courts look at ­whether the disclosing party took
                            steps to control exposure, not ­whether the exposure was observed in real time. APIs
                            can create per­sis­tent, ­silent leakage.
                               Companies using API integrations must treat them as l­egal gateways. The
                            access scope should be documented, l­imited to necessary data  --- ields, and subject to
                            role-­based permissions. Logs should rec­ord what queries ­were made and by whom.
                            Sunset dates or access expiration terms should be imposed to ensure that integra-
                            tions do not outlive their purpose. Where high-­value trade secrets are involved, the
                            com­pany should disable the integration entirely at the conclusion o ---  the proj­ect or
                            engagement.
                               ­These expectations must also be re --- lected in contract. The agreement should de --- ine
                            the permitted scope o ---  API use, prohibit unauthorized data capture, and require
                            access to be disabled when the relationship ends.



                                           API Use Limitation Clauses Control Scope
                                                  and Duration o ---  Data Access
                                 “Recipient ­shall access the Discloser’s systems or data through API connections
                                 only as expressly authorized in writing and solely  --- or the purposes described
                                 in this Agreement. Recipient ­shall not copy, store, analyze, or trans --- er any data
                                 retrieved via API access  --- or purposes beyond the scope o ---  this Agreement. API
                                 credentials ­shall expire upon the conclusion o ---  the proj­ect or termination o ---

                                 the Agreement, whichever occurs  --- irst, and Recipient ­shall cooperate in the
                                 prompt deactivation o ---  all integrations.”
                                    This clause sets ­legal limits on what technical integrations may do. It antici-
                                 pates ­silent overreach and constrains it by contract.



                               APIs are e ---

icient, — lexible, and power­ — ul. But they are also pipelines. I — trade secrets pass through them without control, ­those secrets may be treated as disclosed. Com- panies that rely on integrations to deliver value must also design ­those integrations to preserve secrecy. Anything less leaves them vulnerable not just to technical misuse but also to ­legal — ailure.

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 164 1/12/26 2:51 PM 5 • Mitigating External Vulnerabilities 165

                5.7.3. Cloud Storage and Multi-­Tenant
                       In --- rastructure
                   Cloud environments o ---

er — lexibility, scalability, and cost e —


iciency, but they also introduce signi — icant uncertainty into trade secret protection. When in — ormation is stored on a third-­party plat — orm, the disclosing com­pany o — ten has ­limited visibility into how that in — ormation is managed. It may not control which personnel at the cloud provider can access the data, how the data is backed up or replicated, or ­whether deletion procedures are actually — ollowed. ­These uncertainties ­matter. In a trade secret dispute, the com­pany must be able to show that the in — ormation remained secret and was subject to reasonable e —


orts to maintain that secrecy. When cloud systems oper- ate as black boxes, that showing becomes more di —


icult. One o — the central vulnerabilities o — cloud storage is multi-­tenancy. Many cloud ­services store data — or multiple customers on shared physical in — rastructure, relying on logical separation rather than physical segregation. This structure may be secure in practice, but i — the com­pany cannot explain how access is restricted or demonstrate that no other party had visibility into its data, courts may question ­whether secrecy was truly preserved. This prob­lem is exacerbated when the com­pany lacks a detailed understanding o — the provider’s security controls or has no contractual rights to audit or inquire into data ­handling practices. Cloud-­based collaboration also creates l­egal ambiguity. A — ile stored in a shared cloud — older may be downloaded, copied, or — orwarded without trace. Access logs may be incomplete or hard to retrieve. A proj­ect that ends in — ormally may leave legacy documents on a cloud drive that is still accessible to — ormer vendors, customers, or partners. I — ­those materials are l­ater misused, the com­pany may have no rec­ord o —

                when the exposure occurred or who was responsible. Without that evidence, even a
                valid trade secret claim may  --- ail.
                   To address ­these risks, companies should adopt cloud usage policies that align with
                their trade secret obligations. This includes selecting providers that o ---

er granular access control, robust logging, and compliance with recognized security standards. It also includes maintaining internal inventories o — where trade secrets are stored, who can access them, and how that access is reviewed or revoked over time. Most importantly, companies must treat cloud environments as extensions o — their l­egal obligations, not as neutral plat — orms. Cloud ­service agreements should re — lect this approach. The contract should include repre­sen­ta­tions about how data is stored, what security ­measures are in place, and ­whether the customer retains owner­ship and control. It should also allow — or inspec- tion, certi — ication, or inquiry when something goes wrong. Where trade secrets are involved, companies should avoid providers that disclaim all responsibility — or data loss or access control — ailures.

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 165 1/12/26 2:51 PM 166 5 • Mitigating External Vulnerabilities

                                       Cloud Security Clauses Bolster Trade Secret
                                          Protections in Hosted Environments
                                 “To the extent that Con --- idential In --- ormation is stored or pro­cessed on cloud-­
                                 based plat --- orms or ­services, Recipient ­shall ensure that such plat --- orms imple-
                                 ment access controls, data segregation, encryption in transit and at rest, and
                                 audit logging consistent with industry standards  --- or protection o ---  sensitive
                                 in --- ormation. Recipient ­shall not use any cloud ­service provider that does not
                                 permit data owner­ship to remain with the customer or that prohibits veri --- ica-
                                 tion o ---  security controls upon request.”
                                    This clause imposes minimum expectations and creates a contractual basis

or investigating mishandling. It treats cloud hosting as a legally meaning — ul act, not merely an in — rastructure choice.

                               The decision to store trade secrets in the cloud is not inherently  --- lawed. But it must
                            be accompanied by ­measures that replicate the control and accountability available
                            in physical or on-­premises systems. Without that replication, the trade secret may
                            be lost not through malice but through di ---

usion. Courts evaluating digital secrecy want to see intentional design. When cloud usage re — lects that design, ­legal protec- tion becomes sustainable. When it does not, the ­legal consequences may be beyond recovery.

                            5.7.4. Security Standards and Contractual
                                    Promises
                               When companies entrust trade secrets to third parties —­ especially vendors, ­service
                            providers, or cloud plat --- orms —­ they o --- ten rely on general contractual language
                            requiring the recipient to “maintain appropriate security.” But vague promises are not
                            enough. In a ­legal dispute, the com­pany must show that its trade secrets ­were subject
                            to speci --- ic, veri --- iable protections. Courts have increasingly looked to ­whether the
                            disclosing party demanded compliance with recognized cybersecurity  --- rameworks
                            or industry certi --- ications. ­These standards serve as proxies  --- or reasonableness and
                            provide a benchmark against which ­per --- ormance can be ­measured.
                                The most widely ­adopted  --- rameworks include ISO 27001, SOC 2, (a widely used
                            U.S. auditing and compliance  --- ramework developed by the American Institute o ---  Cer-
                            ti --- ied Public Accountants) and the NIST Cybersecurity Framework. Each provides a
                            structured approach to access control, incident response, data integrity, and system
                            monitoring. Requiring adherence to such standards does not guarantee protection,
                            but it demonstrates that the disclosing party demanded a recognized level o ---  care.

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 166 1/12/26 2:51 PM 5 • Mitigating External Vulnerabilities 167

                This demand ­matters. When trade secrets are exposed due to poor security prac-
                tices, courts o --- ten ask ­whether the disclosing party selected its partners care --- ully and
                imposed meaning --- ul constraints.
                   Certi --- ications alone are not enough. Companies should also require third parties
                to maintain written security policies, per --- orm regular risk assessments, and update
                their controls in response to evolving threats. ­These obligations should be written into
                the agreement. When security is treated as an in --- ormal understanding, the resulting
                protections are rarely en --- orceable. When it is documented in contract and veri --- ied
                through audits or attestations, it becomes part o ---  the structure o ---  secrecy.
                   Security standards also  --- unction as a  --- orm o ---  risk allocation. I ---  a vendor agrees to
                maintain a certain level o ---  protection and ­later su ---

ers a breach due to its own — ailure, the disclosing party has a stronger claim that secrecy was lost due to the vendor’s conduct, not its own. This distinction can be critical in litigation. It may determine ­whether the trade secret ­owner is entitled to relie — or deemed to have — ailed the rea- sonable e —


orts standard.

                              Security Standards Clauses Require
                          Implementation o ---  Recognized Cybersecurity
                                          Frameworks
                     “Recipient ­shall implement and maintain administrative, physical, and tech-
                     nical sa --- eguards consistent with the ISO/IEC 27001 standard (or its succes-
                     sor), the SOC 2 Type II  --- ramework, or an equivalent cybersecurity standard
                     approved in writing by Discloser. Recipient ­shall maintain written in --- ormation
                     security policies, conduct regular security assessments, and certi --- y compliance
                     with ­these standards on an annual basis or upon request. Failure to maintain
                     such sa --- eguards ­shall constitute a material breach o ---  this Agreement.”
                        This clause makes cybersecurity expectations explicit. It also creates a
                     mechanism  --- or accountability by tying contractual ­per --- ormance to veri --- iable

rameworks.

                   Trade secret law is  --- lexible. It does not mandate a par­tic­ul­ar security architecture
                or standard. But it does require intentionality. When a com­pany demands compliance
                with recognized standards and con --- irms that ­those standards are being met, it builds
                a rec­ord o ---  care. That rec­ord may ­later be the di ---

erence between a ­viable claim and a


inding that secrecy was never truly protected. In external relationships, contracts are not just about access. They are about expectation. And when expectations are — ramed in the language o — security, they carry ­legal weight.

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 167 1/12/26 2:51 PM 168 5 • Mitigating External Vulnerabilities

                            5.7.5. Incident Response and Noti --- ication
                                    Obligations
                               No cybersecurity system is per --- ect. Even companies that implement strong techni-
                            cal controls and require their vendors to  --- ollow industry standards must plan  --- or  --- ail-
                            ure. When trade secrets are exposed —­ ­whether through a system breach, misdirected
                            transmission, or internal misuse —­ the response can determine ­whether protection is
                            preserved or lost. Courts examining trade secret claims routinely ask how the com­
                            pany reacted when something went wrong. Silence, delay, or lack o ---

ollow-up may suggest that secrecy was not treated as a serious obligation. This responsibility does not — all solely on the trade secret holder. In external rela- tionships, the risk o — exposure o — ten originates with the other party. A vendor may su —


er a ransomware attack. A customer may — orward con — idential materials to an unsecured system. A third-­party ­service provider may accidentally grant access to an unauthorized user. In each case, the damage may be di —


icult to detect without cooperation. That is why trade secret protection requires not only preventive security ­measures but also a —


irmative duties to noti — y, coordinate, and investigate. Noti — ication obligations are essential. I — a breach occurs or is suspected, the recipi- ent o — the trade secret should be required to alert the disclosing party promptly and share all relevant in — ormation, including when the incident occurred, what systems ­were involved, which data may have been exposed, and what steps are being taken to contain the event. ­These details ­matter. They allow the disclosing party to assess ­legal exposure, noti — y regulators i — required, and take its own protective steps. Without a contractual obligation to disclose this in — ormation, the disclosing party may be le — t unaware ­until it is too late. Timeliness is also critical. Many companies set noti — ication win­dows o — 24 or 48 hours — or cybersecurity incidents. Courts do not require a speci — ic number o — hours, but they do look at ­whether the response was prompt and ­whether the delay contrib- uted to — urther harm. Contracts that de — ine clear timelines and content requirements help establish that the com­pany took reasonable steps to preserve secrecy, even in moments o — vulnerability. Courts do not require proo — that the parties negotiated exact noti — ication windows; acceptance o — a clear and commercially reasonable stan- dard (e.g., 24 hours, 48 hours, or “promptly upon discovery”) is generally su —


icient. Coordination is the third leg o — response. A com­pany that receives notice o — an incident should have the right to participate in the investigation, request updates, and receive access logs or — orensic — indings. ­These rights can be built into the agreement and tied to audit clauses or certi — ication requirements. When a breach occurs, the right to in — ormation becomes a structural necessity.

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 168 1/12/26 2:51 PM 5 • Mitigating External Vulnerabilities 169

                             Incident Response Clauses Require Breach
                            Noti --- ication and Investigation Cooperation
                     “Recipient ­shall noti --- y Discloser in writing within  --- orty-­eight (48) hours o ---

                     becoming aware o ---  any ­actual or suspected unauthorized access, use, or disclo-
                     sure o ---  Con --- idential In --- ormation. Such notice ­shall include the date and time
                     o ---  the incident (i ---  known), the nature and scope o ---  the incident, the systems
                     a ---

ected, the identity o — any individuals involved, and the corrective actions taken or planned. Recipient ­shall cooperate — ully with Discloser in investigating the incident and mitigating its e —


ects, including by providing access to relevant logs, personnel, and third-­party investigators upon request.” This clause ensures that the disclosing party is not le — t in the dark when secrecy is threatened. It establishes a timeline, de — ines the content o — the notice, and imposes an a —


irmative duty to cooperate.

                   A trade secret claim o --- ten hinges not on ­whether in --- ormation was exposed but
                rather on how the ­owner responded. I ---  the disclosing party acted quickly, demanded
                documentation, and took steps to minimize harm, courts are more likely to  --- ind that
                secrecy was preserved. I ---  it ignored warning signs,  --- ailed to investigate, or relied on
                in --- ormal channels, its claim may collapse. In a networked environment, incident
                response is no longer just an IT  --- unction. It is a ­legal obligation, and one that must be
                shared across the contractual relationship.


                5.7.6. Designing Digital Containment Systems
                   The l­egal standard  --- or trade secret protection is not per --- ection. It is reasonable-
                ness. But in digital environments, reasonableness cannot be improvised. It must be
                designed. This is especially true in external relationships, where in --- ormation  --- lows
                across ­organizational bound­aries and into systems the trade secret holder does not
                control. In ­these cases, containment becomes the central challenge. The goal is not to
                eliminate exposure entirely but to ensure that exposure remains knowable, l­imited,
                and correctable.
                   Digital containment means structuring systems so that trade secrets do not travel

urther than intended. It means limiting access based on role, segregating sensi- tive data — rom other materials, and ensuring that ­every interaction with con — idential in — ormation is recorded, reviewable, and reversible. It also means building expiration into access, so that time-­limited proj­ects or evaluations do not create open-­ended vulnerability.

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 169 1/12/26 2:51 PM 170 5 • Mitigating External Vulnerabilities

                               Containment also requires alignment between technical systems and l­egal struc-
                            tures. Contracts should mirror the way systems are con --- igured, and systems should
                            re --- lect what the contract demands. I ---  a contract limits use to a par­tic­ul­ar team or
                            time --- rame, the system should en --- orce t­hose limits. I ---  the contract requires return
                            or destruction, the system should allow  --- or veri --- ication. Mismatches between law
                            and in --- rastructure weaken both. When systems are not designed to support the ­legal

ramework, the ­legal — ramework becomes theoretical. Many companies assume that monitoring is enough. But monitoring without seg- mentation is like recording who walks through an open door. To protect trade secrets, the door must be closed —­ or at least vis­i­ble, controlled, and time-­limited. Contain- ment strategies should include revocable links, session timeouts, geo-­ — encing, encryp- tion, and — orensic watermarking. ­These tools are not just technical — eatures. They are evidence. They allow the com­pany to show that it took secrecy seriously. The most e —


ective containment systems are t­hose that prevent misuse without impeding productivity. Trade secrets o — ten need to be shared to generate value. The task is not to lock them away but rather to create environments where they can be used sa — ely. This requires thought — ul design, coordinated policy, and cross-­ — unctional cooperation among ­legal, engineering, security, and business teams. Containment is not a security protocol. It is a cultural and architectural commitment. Digital containment does not guarantee that trade secrets ­will remain secret. But it creates a rec­ord o — diligence, and that rec­ord is what courts rely on when determin- ing ­whether ­legal protection should survive. When the structure supports the claim, the law has something to en — orce. When it does not, the best intentions — all away. In external relationships, structure is not optional. It is the condition o — secrecy itsel — .

                                                            5.8. Conclusion
                               Trade secret law rewards structure. Nowhere is that more apparent than in the
                            context o ---  external relationships. When in --- ormation is shared beyond the bound­aries
                            o ---  the ­organization, the strength o ---  ­legal protection depends entirely on the systems
                            built to contain it. This chapter has shown that external risk is not a single prob­
                            lem. It is a composite o ---  ­legal ambiguity, technical integration, misaligned incentives,
                            and di ---

use accountability. The common thread is that secrecy cannot survive where responsibility is unclear. ­Every external interaction —­ ­whether with a vendor, collaborator, customer, or dis- tributor —­ introduces its own — orm o — vulnerability. Vendors may retain system-­level access ­a — ter a proj­ect ends. Collaborators may misunderstand who owns the results. Customers may reverse engineer a product or continue using in — ormation ­a — ter a trial expires. Distributors may share materials downstream without proper constraints. And in each o — ­these cases, it is the disclosing party who bears the burden o —


oresight.

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 170 1/12/26 2:51 PM 5 • Mitigating External Vulnerabilities 171

                    What this chapter o ---

ers is not a checklist o — protections but rather a method o —

                thinking. It urges companies to treat trade secrets not just as ­legal assets but as opera-
                tional responsibilities. Agreements must do more than prohibit disclosure. They must
                de --- ine scope, limit use, impose termination procedures, and extend obligations to
                ­every recipient in the chain. Systems must do more than provide access. They must
                 restrict it, monitor it, and allow it to be withdrawn. And ­organizations must do more
                 than hope that ­others ­will behave. They must build relationships that are constrained
                 by design.
                   The under­lying princi­ple is containment. In external environments, secrecy can-
                not be en --- orced ­unless it has been architected in advance. That architecture is l­egal,
                technical, and cultural. It is expressed through audit rights, credential management,
                reverse engineering clauses, and cloud security protocols. It is tested when something
                goes wrong. And it is judged in hindsight, when the com­pany must explain how its
                trade secrets ­were protected —­ not in theory, but in  --- act.
                  The next chapter turns  --- rom prevention to en --- orcement. It asks what happens
                when secrecy  --- ails or someone crosses the line. But the strength o ---  that en --- orcement
                depends on what came be --- ore. Courts cannot en --- orce what was never de --- ined. They
                cannot restore what was never controlled. And they cannot protect secrets that ­were
                not kept. External protection begins long be --- ore any dispute arises. It begins with the
                decision to build a structure where secrecy is not only preserved but also provable.

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 171 1/12/26 2:51 PM 6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 172 1/12/26 2:51 PM Chapter 6 En — orcing Trade Secret Rights

                   Trade secret law protects the use o ---  secrecy in commerce, not secrecy in isolation.
                It does not demand that in --- ormation be hidden away or stripped o ---  its economic
                potential. Instead, it expects that ­those who use trade secrets in business take reason-
                able steps to preserve their con --- identiality. The law  --- ills the space between privacy and
                exchange. It allows secrets to move through the economy —­ to be shared with employ-
                ees, vendors, partners, and customers —­ without being lost along the way.
                    En --- orcement is what makes that structure meaning --- ul. A trade secret becomes
                legally en --- orceable only when the in --- ormation is both protected and misappropriated.
                ­There is no cause o ---  action simply  --- or possession. The law intervenes only when some-
                 thing has gone wrong: when a competitor acquires in --- ormation improperly, when
                 a  --- ormer employee misuses con --- idential knowledge, or when a recipient violates a
                 promise to keep certain data secure. ­These moments o ---  breach trans --- orm secrecy

rom an internal discipline into a ­legal claim. This chapter addresses how ­those claims are asserted, proven, and resolved. The two primary statutes are the UTSA, ­adopted in some — orm by nearly ­every state, and the — ederal DTSA, enacted in 2016. While the two laws are closely aligned, the DTSA provides access to — ederal courts and includes certain remedies and procedural tools unavailable ­under state law. In practice, many trade secret lawsuits assert claims ­under both statutes in parallel. The sections that — ollow walk through the major components o — trade secret en — orcement. They begin with the l­egal de — inition o — misappropriation and proceed to the core evidentiary requirement: proving that the in — ormation at issue quali — ies as a trade secret. From ­there, the chapter turns to remedies —­ injunctions, damages, seizure ­orders, and attorneys’ — ees —­ and concludes with a discussion o — criminal lia- bility and procedural strategy. Along the way, the doctrine is grounded in real cases: disputes where courts had to decide ­whether secrecy had been preserved, ­whether conduct was improper, and ­whether en — orcement was justi — ied. Trade secret en — orcement is not just about recovering losses. It is about validating the com­pany’s protection system. Courts ask ­whether the plainti —


treated the in — or- mation as secret, ­whether it communicated ­those expectations to ­others, and ­whether it took action when ­those expectations ­were breached. A lawsuit is not the beginning o — trade secret protection. It is the — inal test. Every­thing that came be — ore —­ contracts,

                                                            173

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 173 1/12/26 2:51 PM 174 6 • En — orcing Trade Secret Rights

                            controls, culture, and communication —­ ­will be judged in the cold light o ---  litigation.
                            This chapter explains how that ­process works.



                                               6.1. The Statutory De --- inition o ---

                                                      Misappropriation
                               ­Every trade secret case begins with the allegation o ---  misappropriation. This is not
                            a general claim that valuable in --- ormation was misused. It is a speci --- ic l­egal assertion
                            that the de --- endant acquired, disclosed, or used a trade secret by improper means or in
                            breach o ---  a ­legal duty. The UTSA and the DTSA use nearly identical language to de --- ine
                            misappropriation, and courts interpreting both statutes have developed a shared body
                            o ---  doctrine. That doctrine draws a clear distinction between ordinary competition and
                            wrong --- ul appropriation.
                                ­Under both statutes, misappropriation includes three distinct acts: improper acqui-
                            sition, improper disclosure, and improper use. A single case may involve more than
                            one. For example, a departing employee may take trade secrets when resigning (acqui-
                            sition), send them to a competitor (disclosure), and help that competitor launch a new
                            product based on the in --- ormation (use). But each  --- orm o ---  misappropriation is in­de­
                            pen­dently actionable. A plainti ---

does not need to prove all three. The statutes also impose liability on recipients who acquire a trade secret — rom some- one ­else but knew or should have known that it was misappropriated. This provision expands liability to downstream actors and prevents companies — rom turning a blind eye to suspicious disclosures. Courts do not require ­actual knowledge, but they do examine what the de — endant should have understood — rom the circumstances. That standard can be satis — ied by timing, relationship history, or the nature o — the in — ormation involved. Courts apply a totality-o — -the-circumstances test, weighing these — actors together to decide whether the recipient had reason to know the disclosure was improper. What ­these de — initions share is the requirement that the de — endant crossed a l­egal line. The conduct must have involved deception, breach o — duty, or some — orm o —

                            improper access. Trade secret law does not prohibit ­independent development. It does
                            not punish observation o ---  publicly available products. It does not block reverse engi-
                            neering so long as the product was law --- ully acquired. The  --- ocus is on  --- airness and trust.
                            Misappropriation occurs when ­those expectations are ­violated.
                               The sections that  --- ollow examine each type o ---  misappropriation in turn —­ starting
                            with improper acquisition, the most direct and vis­i­ble  --- orm o ---  trade secret the --- t.


                            6.1.1. Acquisition by Improper Means
                               The most straight --- orward  --- orm o ---  misappropriation is improper acquisition.
                            When a person or entity obtains a trade secret through the --- t, deception, or some
                            other wrong --- ul act, the violation occurs at the moment o ---  acquisition, regardless o ---

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 174 1/12/26 2:51 PM 6 • En — orcing Trade Secret Rights 175

                ­whether the in --- ormation is l­ater used or shared. Courts have l­ittle di ---

iculty recog- nizing this — orm o — misappropriation. It is the clearest violation o — both ­legal duties and commercial ethics. The UTSA and the DTSA both de — ine “improper means” to include the — t, bribery, misrepre­sen­ta­tion, breach or inducement o — a duty to maintain secrecy, and espionage through electronic or other means. ­These examples are illustrative, not exhaustive. Courts have extended the de — inition to cover creative or indirect tactics, including surveillance, trickery, and deliberate circumvention o — access restrictions. The essen- tial idea is that the in — ormation was acquired in a way that ­violated the rules governing its con — identiality. The case o — E.I. du Pont de Nemours v. Christopher is one o — the most iconic early examples. DuPont was constructing a chemical plant designed to produce methanol using proprietary pro­cesses. The plant was open to the air — or construction purposes but other­wise shielded — rom public view. The de — endants, acting on behal — o — a com- petitor, hired a ­pilot to take aerial photo­graphs o — the site. DuPont sued — or trade secret misappropriation, arguing that the photography revealed con — idential design in — ormation.

                             Violating Commercial Norms Can Establish
                                         “Improper Means”

                                             E.I. du Pont de Nemours & Co. v. Christopher
                                                     431 F.2d 1012 (5th Cir. 1970)
                        De --- endants hired a ­pilot to  --- ly over DuPont’s methanol plant construction
                     site and take photo­graphs revealing structural  --- eatures o ---  a proprietary ­process.
                     Although the site was vis­i­ble  --- rom the air and not physically secured against
                     aerial observation, the court held that such surveillance constituted improper
                     means. It emphasized that trade secret law requires companies to guard against
                     only ­those intrusions that violate reasonable commercial norms, not all pos­si­
                     ble intrusions. A competitor cannot claim innocence merely ­because the in --- or-
                     mation was obtained without trespassing. Although decided be --- ore widespread
                     state adoption o ---  the UTSA or enactment o ---  the DTSA, the Fi --- th Circuit’s rea-
                     soning in remains cited as good law  --- or its articulation o ---  the common-law duty
                     to re --- rain  --- rom improper means o ---  acquisition.



                   The Fi --- th Cir­cuit’s opinion in DuPont has remained in --- luential. It illustrates that
                improper means is not l­imited to physical the --- t or direct misrepre­sen­ta­tion. It also
                includes conduct that, while technically l­egal in another context, becomes unlaw --- ul
                when used to acquire con --- idential in --- ormation. The test is not ­whether the method
                was creative —­ rather, it is ­whether it respected the norms o ---  con --- identiality that make
                trade secret protection pos­si­ble.

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 175 1/12/26 2:51 PM 176 6 • En — orcing Trade Secret Rights

                               Improper acquisition also occurs in more conventional settings. Employees who
                            download con --- idential  --- iles be --- ore resigning, vendors who copy proprietary materi-
                            als outside the scope o ---  a proj­ect, and researchers who smuggle internal data to a
                            competitor all  --- all within the statute. In many o ---  ­these cases, the act o ---  acquisition
                            itsel ---  is a breach o ---  contract or  --- iduciary duty. But even where no  --- ormal relationship
                            exists, the circumstances may impose a duty not to seek access through trickery or
                            coercion.
                               One o ---  the challenges in modern litigation is distinguishing improper acquisition

rom passive receipt. A person who stumbles upon a con — idential document without seeking it out may not be liable ­unless they had reason to know it was protected. But a person who solicits, extracts, or manipulates their way into access —­ especially i — the in — ormation is marked con — idential or clearly sensitive —­ takes on ­legal risk. The more deliberate the conduct, the stronger the in — erence o — impropriety. The next section turns to a di — ­ — er­ent kind o — violation: improper use o — trade secrets that ­were law — ully acquired. While acquisition o — ten de — ines the — ront end o — misap- propriation, many cases are built on what the de — endant did with the in — ormation once they had it.

                            6.1.2. Improper Use
                               A person who law --- ully acquires a trade secret may still be liable  --- or misappropria-
                            tion i ---  they use it in violation o ---  a duty. This  --- orm o ---  liability does not depend on the --- t,
                            deception, or surveillance. It depends on how the in --- ormation is used once it is in the
                            de --- endant’s hands. The core idea is that trade secret protection  --- ollows the in --- orma-
                            tion —­ not just how it is obtained, but how it is exploited.
                                Improper use occurs when a person leverages a trade secret  --- or their own bene --- it
                            or  --- or the bene --- it o ---  a third party in a way that violates an obligation o ---  con --- identiality
                            or breaches the expectations ­under which the in --- ormation was shared. This includes
                            using the secret to develop a competing product, in --- orm internal strategy, accelerate
                            timelines, or bypass costly research and development. The use need not be vis­i­ble to
                            the public or result in a  --- inal product. Even internal application can trigger liability i ---

                            it con --- ers a commercial advantage and violates the terms ­under which the in --- orma-
                            tion was received.
                               Improper use claims o --- ten arise in collaborative settings. A com­pany shares a proto-
                            type, ­process, or dataset with a partner ­under the terms o ---  a joint proj­ect or evaluation
                            agreement. The partner then applies that knowledge in another context, sometimes
                            unintentionally, sometimes deliberately. The ­legal question is not ­whether the in --- orma-
                            tion was help --- ul but ­whether its use exceeded the scope o ---  the agreed purpose.

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 176 1/12/26 2:51 PM 6 • En — orcing Trade Secret Rights 177

                                     Improper Use o ---  Properly Acquired
                                   In --- ormation Can Be Misappropriation

                                     Altavion, Inc. v. Konica Minolta Systems Laboratory, Inc.
                                            226 Cal. App. 4th 26 (Cal. Ct. App. 2014)
                       Altavion disclosed a digital authentication concept to Konica Minolta  --- or
                    evaluation in connection with pos­si­ble collaboration. Konica Minolta ­later  --- iled
                    patent applications incorporating the core ideas. Altavion sued  --- or trade secret
                    misappropriation. The court held that the disclosed in --- ormation, while not a

inished product, quali — ied as a trade secret and that Konica’s use in patent — il- ings was actionable. The case con — irmed that misuse o — con — idential ideas—­ even when received ­under a business relationship —­ can constitute improper use.

                   Altavion is illustrative o ---  a broader princi­ple. Companies do not lose trade secret pro-
                tection simply ­because they share in --- ormation in the hope o ---  collaboration. But when
                that in --- ormation is used outside the bounds o ---  the relationship, especially in ways that
                con --- er exclusive control or public recognition, the law treats that as misappropriation.
                   Improper use also arises within employment. Employees may take knowledge
                acquired on the job and apply it in a new role  --- or a competitor. Courts do not prohibit
                the use o ---  general experience or publicly known practices. But when the employee draws
                on speci --- ic, nonpublic in --- ormation that provided a competitive edge, and does so in a
                way that violates a contractual or implied duty o ---  con --- identiality, liability may  --- ollow.



                              Internal Use o ---  Con --- idential In --- ormation
                                      Can Be Misappropriation

                                                                    3M v. Pribyl
                                                            259 F.3d 587 (7th Cir. 2001)
                        An employee le --- t 3M and joined a competitor, taking with him knowledge
                    o ---  internal manu --- acturing pro­cesses that ­were not publicly disclosed. He used
                    ­these insights to improve production at the new com­pany. The court held that
                     the use o ---  the con --- idential ­process in --- ormation gained during prior employ-
                     ment and subject to ongoing con --- identiality obligations constituted misappro-
                     priation. The  --- act that the employee did not take physical documents did not
                     alter the outcome.



                   The 3M case makes clear that trade secrets do not need to be copied or disclosed
                to be misused. I ---  the de --- endant internalizes the in --- ormation and applies it in a way

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 177 1/12/26 2:51 PM 178 6 • En — orcing Trade Secret Rights

                            that substitutes  --- or i­ndependent development, the law may impose liability. Courts
                            typically in --- er use o ---  internalized in --- ormation  --- rom circumstantial evidence—such as
                            temporal proximity, similarity o ---  results, or absence o ---  an independent development
                            record—rather than requiring direct proo ---  o ---  copying.
                               Improper use can be subtle. It o --- ten occurs without  --- an --- are or direct communi-
                            cation. But where the  --- acts show that a de --- endant derived value  --- rom con --- idential
                            in --- ormation in breach o ---  an expectation, the law treats that conduct as a  --- orm o ---

                            the --- t. The next section turns to improper disclosure —­ where the secret is not used
                            by the de --- endant but rather passed to ­others in violation o ---  the duty to maintain
                            con --- identiality.


                            6.1.3. Improper Disclosure
                                Disclosure o ---  a trade secret without authorization is a standalone basis  --- or liabil-
                            ity. It does not require that the de --- endant bene --- it personally or use the in --- ormation

or competitive purposes. The l­egal wrong lies in breaking the expectation that the in — ormation would remain con — idential. Disclosure o — ten ­causes greater harm than use ­because it multiplies the number o — actors who now possess the secret. Once in — ormation is shared without control, l­egal remedies may still exist, but practical containment is — ar more di —


icult. Improper disclosure occurs when someone entrusted with a trade secret pro- vides access to another person or entity who is not authorized to receive it. This can happen through an intentional leak, a negligent communication, or an indirect hando —


—­ such as uploading a con — idential — ile to a public — older or — orwarding an email without redacting sensitive material. In each case, the key issue is ­whether the de — endant had a duty to keep the in — ormation secret and ­whether that duty was breached. Employees and — ormer employees are the most common de — endants in disclosure cases. I — a person learns a trade secret in the course o — their work and then shares it with a competitor, colleague, or new employer without permission, they have likely committed misappropriation. The same is true — or contractors, vendors, or ­consultants who receive con — idential in — ormation ­under a nondisclosure agreement or implied duty o — con — identiality. Disclosure in violation o — ­those obligations breaches both ­legal norms and commercial trust. In Air — acts v. Amezaga, the plainti —


, an aviation data — irm, alleged that a depart- ing employee had emailed proprietary — light rec­ords and analy­sis tools to his per- sonal account be — ore leaving the com­pany. The court — ound that the in — ormation was not adequately protected (­there was no nondisclosure agreement and access was not clearly ­limited), but it still addressed the question o — disclosure. The employee’s act o — trans — erring data outside the com­pany’s systems constituted potential misap- propriation through improper disclosure, even i — the in — ormation was not — urther disseminated.

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 178 1/12/26 2:51 PM 6 • En — orcing Trade Secret Rights 179

                                 Improper Disclosure (Without Use) Can
                                     Constitute Misappropriation

                                                             Air --- acts, Inc. v. Amezaga
                                                            909 F.3d 84 (4th Cir. 2018)
                        An employee emailed internal aviation data to himsel ---  be --- ore resigning.
                     The com­pany alleged misappropriation, and the court acknowledged that
                     even without ­later use, the act o ---  removing con --- idential in --- ormation  --- rom the
                     com­pany’s control could be actionable as improper disclosure. However, the
                     court ultimately denied relie ---  due to insu ---

icient evidence that the com­pany had taken reasonable steps to protect the in — ormation as a trade secret.

                   The Air --- acts case illustrates how closely courts link disclosure with secrecy. Even
                when the act o ---  disclosure is clear, a plainti ---

cannot prevail ­unless it also shows that the in — ormation was treated as con — idential. Disclosure alone is not enough. The law protects secrets —­ not merely data. Other cases involve more public — orms o — dissemination. In Allstate v. Fougere, a departing insurance agent was accused o — providing business strategy documents and customer data to a rival — irm. The court evaluated ­whether the materials ­were shared in violation o — contract and ­whether the disclosures rendered the in — ormation no lon- ger secret. Improper disclosure is a double injury: it violates the duty o — con — identiality and may destroy the very trade secret status the plainti —


seeks to protect. Improper disclosure is o — ten harder to prove than improper use. Documents may be shared through private channels, and the plainti —


may only discover the leak ­a — ter damage has occurred. Courts look at circumstantial evidence, such as email logs, overlapping timelines, and parallel product — eatures, to assess ­whether the de — endant likely disclosed the in — ormation to ­others. Where the evidence is strong, relie — may include not just damages but also injunctions barring — urther dissemination. Trade secrets are o — ten shared internally ­under assumptions o — trust. But when ­those assumptions break down, improper disclosure becomes a gateway to irreversible harm.

                6.1.4. Liability  --- or Knowing Receipt
                   Trade secret law does not limit liability to ­those who originally misappropriate in --- or-
                mation. It also imposes liability on recipients who acquire trade secrets  --- rom ­others and
                who knew or had reason to know that the in --- ormation was obtained through improper
                means. This provision serves a critical role in modern business contexts, where con-

idential in — ormation is o — ten passed between entities, across transactions, or through intermediaries. It prevents companies — rom insulating themselves by claiming that they ­were not the original wrongdoer, even as they bene — it — rom the misappropriation.

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 179 1/12/26 2:51 PM 180 6 • En — orcing Trade Secret Rights

                               The key ele­ment is knowledge. The statute requires that the recipient “knew or
                            had reason to know” that the in --- ormation was misappropriated. Courts interpret this
                            standard objectively. It does not require that the recipient be told explic­itly that the
                            trade secret was stolen. Instead, it asks ­whether a reasonable person in the same posi-
                            tion would have understood that the in --- ormation came with baggage. ­Factors such
                            as the timing o ---  disclosure, the nature o ---  the parties’ relationship, the level o ---  detail
                            involved, and the presence o ---  protective markings are illustrative rather than exhaus-
                            tive. Courts assess the totality o ---  the circumstances to determine whether a reasonable
                            recipient should have recognized that the in --- ormation was improperly obtained.
                               Cases involving departing employees  --- requently raise this issue. A new employer
                            who receives valuable in --- ormation  --- rom a recent hire may  --- ace liability i ---  the context
                            suggests that the knowledge was obtained  --- rom the  --- ormer employer in violation o ---

                            a duty. Courts expect companies to per --- orm diligence, especially when hiring  --- rom
                            competitors in sensitive roles. Failing to ask questions or choosing not to know can
                            be treated as will --- ul blindness.



                                    Constructive Knowledge o ---  Insider In --- ormation
                                        Can Be “Threatened” Misappropriation

                                                                  PepsiCo, Inc. v. Redmond
                                                                 54 F.3d 1262 (7th Cir. 1995)
                                    Redmond, a  --- ormer PepsiCo executive, accepted a position with Quaker, a
                                 direct competitor. PepsiCo sought an injunction on the grounds that Redmond
                                 would inevitably use trade secrets in his new role. The court  --- ound that Red-
                                 mond had knowledge o ---  PepsiCo’s con --- idential pricing and marketing strate-
                                 gies and that Quaker had hired him into a role that would bene --- it  --- rom ­those
                                 secrets. The court held that Quaker ­either knew or should have known that it
                                 would receive and use the in --- ormation improperly, even i ---  no documents ­were
                                 taken or disclosures made.



                               PepsiCo illustrates that courts do not require direct evidence o ---  misappropriation
                            when the circumstances strongly suggest that trade secrets ­will be used or disclosed.
                            When a new employer places a  --- ormer competitor’s insider in a position to exploit
                            that knowledge, the law may impute liability. Knowledge can be in --- erred  --- rom context.
                               Liability  --- or knowing receipt o ---  con --- idential in --- ormation also arises in joint ven-
                            tures, licensing discussions, and mergers and acquisitions. A com­pany reviewing
                            another party’s con --- idential materials ­under a nondisclosure agreement may ­later be
                            accused o ---  misuse even i ---  it believed the materials ­were not protected. I ---  the in --- orma-
                            tion was clearly marked as con --- idential and shared in a structured way, the recipient
                            has ­little excuse. Courts are skeptical o ---  claims that the recipient did not understand

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 180 1/12/26 2:51 PM 6 • En — orcing Trade Secret Rights 181

                the material’s status, particularly when the parties had negotiated access ­under spe-
                ci --- ic ­legal terms.


                          Knowing Receipt o ---  Con --- idential In --- ormation
                            Can Establish Misappropriation Liability

                                                  Bimbo Bakeries USA, Inc. v. Botticella
                                                      613 F.3d 102 (3d Cir. 2010)
                        Botticella, a ­senior executive at Bimbo Bakeries, accepted an o ---

er — rom a competitor while still employed. He continued to access con — idential product development — iles ­a — ter accepting the new role. The court held that the new employer had reason to know that the in — ormation Botticella possessed had been obtained in violation o — his duties to Bimbo. The risk o — disclosure was inherent in the role, and the circumstances surrounding Botticella’s departure raised red — lags that the recipient com­pany — ailed to address.

                   A takeaway  --- rom Bimbo Bakeries is that recipients cannot ignore obvious warn-
                ing signs. When someone departs  --- rom a position with access to sensitive materials
                and immediately moves to a competitor, courts expect the recipient to investigate.
                A  --- ailure to do so may convert the recipient into a participant in the misappropria-
                tion —­ even without active solicitation.
                   However, an employer is not automatically liability  --- or its new employee’s misap-
                propriation. O ---  that employee’s prior employer’s trade secrets. A hiring company’s lia-
                bility  --- or trade secret misappropriation depends on its own knowledge and intent, not
                merely the actions o ---  the employee. Even when misappropriation occurs, the absence
                o ---  corporate scienter (knowing wrongdoing) can preclude punitive damages and  --- ee
                awards, which is a critical  --- actor  --- or both damages assessment and settlement strategy.


                                    CORPORATE LIABILITY AND WILLFULNESS

                                Allied Erecting & Dismantling Co. v. Genesis Equip. & M --- g., Inc.
                                                511 F. App’x 398 (6th Cir. 2013)
                        Mark Ramun, a  --- ormer manager at Allied Erecting, retained approximately
                     15,000 pages o ---  con --- idential design documents, including in --- ormation relating
                     to Allied’s patented demolition attachment, the Allied MT, when he le --- t Allied
                     in 2001. In 2003, Genesis—a direct competitor—hired Ramun  --- or sales and
                     later promoted him to director o ---  development. The jury  --- ound that Ramun
                     misappropriated Allied’s trade secrets in developing Genesis’s competing LXP
                     and Versi-Pro products, but it declined to  --- ind Genesis liable  --- or will --- ul or

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 181 1/12/26 2:51 PM 182 6 • En — orcing Trade Secret Rights

                                 malicious conduct. The Sixth Circuit a ---

irmed, holding that a company hiring a — ormer competitor’s employee is not automatically liable — or the employee’s misconduct absent evidence that the company knowingly exploited misappro- priated in — ormation.

                               A company hiring  --- rom a competitor should require written certi --- ications o ---  non-
                            use, audit incoming devices, assign clean teams, and document independent design
                            steps. Courts view such compliance records as persuasive evidence o ---  good  --- aith and
                            a barrier to secondary liability.
                               The ­legal theory ­behind knowing receipt is ­simple. Trade secret protection depends
                            on rein --- orcing commercial ethics. I ---  companies could bene --- it  --- rom stolen or misused
                            in --- ormation simply by not asking questions, the doctrine would collapse. By imposing
                            liability on ­those who should have known, the law promotes diligence,  --- airness, and
                            structural accountability.


                            6.1.5. Limits o ---  the Statutory Scope
                               Trade secret law does not protect every­thing a business pre --- ers to keep private. The
                            statutes impose rigorous limits on what quali --- ies as a trade secret, requiring plainti ---

s to demonstrate that the in — ormation at issue is speci — ic, nonpublic, and subject to reasonable protection e —


orts. The cases in this section de — ine the outer bound­aries o — the doctrine and serve to rein — orce the princi­ple that protection is earned through discipline, not presumed by law. Some claims — ail ­because the alleged trade secret is too vague. Courts require a reasonably speci — ic description o — the in — ormation at issue —­ enough to distinguish it


rom general business practices or publicly available materials.

                                             Trade Secret Claims Require Speci --- icity

                                                                   Aday v. West --- ield Ins. Co.
                                                            2021 WL 1173003 (W.D. Ky. Mar. 29, 2021)
                                     The plainti ---

alleged that West — ield Insurance misappropriated his “claims ­handling ­process,” which he claimed was con — idential. The court dismissed the claim, holding that the ­process was described only in general terms and lacked the speci — icity needed to quali — y as a trade secret. The court emphasized that business acumen or pro — essional judgment is not protectable ­unless tied to concrete, identi — iable in — ormation.

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 182 1/12/26 2:51 PM 6 • En — orcing Trade Secret Rights 183

                   A common pit --- all  --- or plainti ---

s is the — ailure to precisely articulate what they believe is a trade secret. In Aday, the plainti —


accused an insurer o — misappropriat- ing a “claims ­handling ­process” yet never described that ­process in speci — ic detail. The court dismissed the case on the pleadings, emphasizing that trade secret law can only protect in — ormation when it is clearly de — ined and distinguishable — rom general business practices or a pro — essional’s “know-­how.” Abstract re — erences, conclusory labels, or vague allusions are not enough. Trade secret statutes do not provide retro- active protection — or instructional materials, pro­cesses, or systems that are already widely used in an industry. For content or pro­cesses to quali — y as a “trade secret,” the plainti —


must demonstrate genuine secrecy and originality, not just commercial value or e —


ort expended.

                               Public Disclosure Destroys Trade Secret
                                             Protection

                                                  Religious Technology Center v. Lerma
                                                   908 F. Supp. 1362 (E.D. Va. 1995)
                        The plainti ---

alleged that movie industry in — ormation posted online by a


ormer employee constituted a trade secret. The court disagreed, holding that once the content had been published to the internet and circulated publicly, it no longer satis — ied the secrecy requirement. The court declined to impose liability — or use o — in — ormation that was already in the public domain.

                    Even where a trade secret once existed, its protection is not permanent. In Lerma,
                proprietary in --- ormation was posted online and rapidly circulated in the public
                domain. The court held that the moment in --- ormation becomes widely accessible,
                it instantaneously loses its status as a protectable secret. The law does not permit a
                trade secret ­owner to “recapture” con --- identiality ­a --- ter allowing public access. Relent-
                less discipline in controlling access, use, and distribution is mandatory; once lost,
                trade secret protection cannot be restored.
                    ­These decisions underscore the structural nature o ---  trade secret law. To be pro-
                tected, the in --- ormation must be clearly de --- ined, objectively secret, and actively treated
                as con --- idential. Courts do not stretch the statute to cover business grievances that
                arise  --- rom weak protections, broad generalizations, or post hoc claims o ---  con --- idential-
                ity. At the boundary o ---  the doctrine, the law insists on discipline —­ and denies protec-
                tion to ­those who  --- ail to impose it.

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 183 1/12/26 2:51 PM 184 6 • En — orcing Trade Secret Rights

                                                     6.2. Limits o ---  Liability and
                                                           Early Dismissal
                                The substantive limits discussed above have direct procedural consequences.
                            Unlike patent or copyright suits, which begin with a registered right, trade secret
                            litigation requires the plainti ---

to prove at the outset that a protectable secret existed. I — the complaint — ails to plausibly allege the — oundational ele­ments —­ a speci — ic secret, reasonable security ­measures, and improper conduct —­ the case is vulnerable to early dismissal. This section reviews ­these common — ailure modes in early-­stage litigation. Courts apply the law with discipline, not to deny protection but rather to ensure that it applies only where the statutory requirements are met. The — ollowing subsections group early dismissal cases according to the speci — ic ­legal de — iciency alleged by the de — endant.

                            6.2.1. Failure to Allege a Cognizable
                                    Trade Secret
                               A trade secret plainti ---

must describe the secret it seeks to protect with enough speci — icity to give the de — endant — air notice and allow the court to assess ­whether the in — ormation quali — ies — or protection. While a plainti —


is not expected to reveal the entire secret in a public — iling, the complaint must contain more than vague re — erences to “proprietary pro­cesses” or “con — idential strategies.” Claims that — ail this standard are o — ten dismissed be — ore discovery begins, as courts are skeptical o — complaints that rely on conclusory language to protect general business concepts.

                                                    Vague Allegations o ---  Secrets Are
                                                       Subject to Early Dismissal

                                                                   Aday v. West --- ield Ins. Co.
                                                            2021 WL 1173003 (W.D. Ky. Mar. 29, 2021)
                                     The plainti ---

alleged that West — ield Insurance misappropriated his “claims ­handling ­process,” but he did not describe the ­process in concrete terms. The court dismissed the case on the pleadings, holding that the plainti —


’s descrip- tion was too general to support a trade secret claim. Without more detail, the court could not determine ­whether the ­process was novel, valuable, or non-­ obvious to ­others in the industry.

                               The procedural consequences o ---

ailing to meet the speci — icity requirement are illus- trated clearly in Aday. The plainti —


’s claim that West — ield Insurance misappropriated

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 184 1/12/26 2:51 PM 6 • En — orcing Trade Secret Rights 185

                his “claims ­handling ­process” was dismissed on the pleadings ­because the description
                was too abstract. The court could not determine ­whether the ­process was novel, valu-
                able, or non-­obvious to ­others in the industry. This outcome serves as a critical lesson

or litigators: I — the court cannot distinguish the alleged secret — rom general business acumen or publicly available in — ormation based on the complaint’s allegations, the claim ­will not survive a motion to dismiss pursuant to FRCP 12(b)(6). A plainti —


must be prepared to articulate the speci — ic bound­aries o — their secret — rom day one.

                6.2.2. Failure to Show Reasonable E ---

orts to Maintain Secrecy The most — requently misunderstood requirement in trade secret litigation is the obligation to take reasonable e —


orts to maintain secrecy. Plainti —


s o — ten assume that the importance o — the in — ormation speaks — or itsel — or that its con — idential nature is obvious within the ­organization. But trade secret law does not rely on assumption. It requires evidence —­ evidence that the in — ormation was treated as a secret in policy, in practice, and in communication. Courts do not demand per — ection. The standard is not absolute security but rather reasonable conduct ­under the circumstances. What counts as reasonable ­will vary depending on the sensitivity o — the in — ormation, the structure o — the business, the size o — the team, and the nature o — the relationship between the parties. But certain basic expectations apply across industries: the use o — nondisclosure agreements, access lim- itations, document labeling, employee training, and termination procedures. Where ­these are absent or inconsistently applied, courts are quick to — ind that the secrecy ele­ment has not been met. The — ollowing case shows how the complete absence o — ­these controls can be — atal to the plainti —


’s claim.

                                              Reasonable E ---

orts Require Foundational Sa — eguards

                                                             Air --- acts, Inc. v. Amezaga
                                                            909 F.3d 84 (4th Cir. 2018)
                        A  --- ormer employee allegedly disclosed proprietary airline data ­a --- ter leaving
                     the com­pany. The court  --- ound that Air --- acts had not taken reasonable steps to
                     protect the in --- ormation. ­There ­were no signed nondisclosure agreements, no
                     documented access restrictions, and no internal protocols indicating that the
                     in --- ormation was treated as con --- idential. ­Because the com­pany had  --- ailed to
                     impose even minimal protections, the court ruled that the in --- ormation was not
                     a trade secret ­under the statute.

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 185 1/12/26 2:51 PM 186 6 • En — orcing Trade Secret Rights

                                    This case illustrates the structural nature o ---  the secrecy requirement. It is
                                 not enough  --- or in --- ormation to be internal or use --- ul. I ---  the com­pany has not
                                 documented its protections, de --- ined its expectations, or ­limited access to ­those
                                 with a need to know, courts are likely to conclude that it  --- or --- eited any claim to
                                 secrecy, ­whether intentionally or not.



                               Some cases pre­sent closer questions. The com­pany may have some protections in
                            place but  --- ail to apply them uni --- ormly. Courts are especially wary o ---  inconsistency:
                            when a com­pany treats similar materials di ---

erently or allows exceptions to its own rules, it undermines its position in litigation. The next case demonstrates how ­these internal contradictions can unravel a trade secret claim.

                                                            Reasonable E ---

orts Must Be Consistently Applied

                                                                   Allstate Ins. Co. v. Fougere
                                                            2021 WL 4441348 (D. Mass. Sept. 28, 2021)
                                     Allstate alleged that a  --- ormer insurance agent took con --- idential customer
                                 in --- ormation and internal training materials to a competitor. The court  --- ound
                                 that Allstate had not applied its secrecy policies consistently. Some materials
                                 ­were shared widely without restriction, while ­others ­were protected. ­Because
                                  the com­pany had not made a clear and uni --- orm e ---

ort to designate the in — orma- tion as con — idential, the court dismissed the trade secret claim in part.

                                Fougere re --- lects a broader judicial concern: I ---  the com­pany itsel ---  was unclear about
                            what was con --- idential, how could a third party be expected to understand the bound­
                            aries? Trade secret law assumes that secrets must be signaled. It is not enough that
                            they are understood internally; rather, they must be actively communicated and
                            en --- orced. Lapses, ambiguity, or silence create vulnerability not just to misuse but also
                            to ­legal  --- ailure.
                                ­These cases also re --- lect the evidentiary posture o ---  early-­stage litigation. Courts do
                            not wait  --- or discovery to test the secrecy ele­ment. They look  --- or concrete allegations
                            in the complaint that show reasonable e ---

orts ­were made, i.e., that the plainti —


had a plan, that the plan was — ollowed, and that the secret was protected accordingly. When ­those details are missing, the claim may not proceed. Reasonable e —


orts are not a ­matter o — checklists or boilerplate. They require align- ment between what the com­pany values and how it behaves. Courts reward that align- ment. They do not supply it ­a — ter the — act.

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 186 1/12/26 2:51 PM 6 • En — orcing Trade Secret Rights 187

                6.2.3. Failure to Allege Improper Conduct
                   The  --- inal category o ---  early dismissal involves claims where the de --- endant’s conduct,
                even i ---  commercially aggressive, does not quali --- y as misappropriation. Trade secret law
                does not prohibit competition, ­independent development, or the use o ---  general indus-
                try knowledge. It prohibits the acquisition, use, or disclosure o ---  trade secrets through
                improper means or in breach o ---  a duty. I ---  the complaint  --- ails to allege that kind o ---  con-
                duct, the case is likely to be dismissed, even i ---  the outcome  --- eels un --- air to the plainti ---

. Improper means must involve some — orm o — deception, breach o — trust, or cir- cumvention o — access restrictions. This includes the — t, misrepre­sen­ta­tion, violation o —

                nondisclosure agreements, or leveraging insider knowledge obtained ­under a duty o ---

                con --- identiality. But many plainti ---

s allege only that the de — endant developed a com- peting product or bene — ited — rom access to ideas discussed in a business meeting. Without more, ­those — acts do not establish liability. The law is designed to protect secrets, not to preserve advantage in­de — ­initely ­a — ter the in — ormation is shared. The case below illustrates a common ­mistake: pleading commercial harm without showing a breach o — ­legal obligation.

                                           Misappropriation Claims Must
                                             Allege Improper Conduct

                                                  American Registry, LLC v. Hanaw
                                              2013 WL 6332971 (M.D. Fla. Dec. 5, 2013)
                        The plainti ---

alleged that a — ormer business associate used customer data and business methods to start a competing ­service. The court dismissed the trade secret claim, holding that the complaint — ailed to describe how the in — orma- tion was protected or how the de — endant’s conduct quali — ied as improper. Even assuming the data had value, ­there was no allegation o — breach, deception, or contractual duty. The court — ound that the plainti —


’s claims amounted to a complaint about competition, not misappropriation.

                   Hanaw demonstrates that trade secret claims must be rooted in clear ­legal theory.
                Courts expect plainti ---

s to identi — y the duty that was breached, ­whether contractual,


iduciary, or circumstantial, and to show how the de — endant’s conduct crossed the line. I — the complaint does not allege improper acquisition, unauthorized disclosure, or misuse o — con — idential in — ormation, it ­will not survive. This limitation also protects legitimate reverse engineering and ­independent devel- opment. A com­pany that creates a similar product based on public materials or its own research does not commit misappropriation, even i — the — inal result resembles that o —

                a competitor. The statutes are not designed to punish similarity. They punish breach.

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 187 1/12/26 2:51 PM 188 6 • En — orcing Trade Secret Rights

                                Courts apply this boundary with increasing discipline. As trade secret claims have
                            become more common in business disputes, judges have grown wary o ---  plainti ---

s attempting to use trade secret law to block — air competition or to dress up — ailed busi- ness negotiations as torts. To avoid early dismissal, the complaint must identi — y spe- ci — ic conduct that quali — ies as wrong — ul ­under the statute and connect that conduct to a protectable secret. Anything less, and the claim ­will not proceed.

                                                 6.3. Proving the Trade Secret
                                                       at the Time o ---  Suit
                               Trade secret status is not established by allegation alone. Even i ---  a plainti ---

survives a motion to dismiss, it must eventually prove that the in — ormation at issue quali — ies — or protection ­under the law. This proo — must be made with evidence. It is not su —


icient that the in — ormation was secret at some point in the past; rather, it must have been a trade secret at the time o — the alleged misappropriation. This requirement imposes a continuing obligation on trade secret holders to maintain control, to monitor access, and to treat the in — ormation as con — idential over time. Courts apply a three-­part standard derived — rom the statutory de — inition. The plain- ti —


must prove that the in — ormation (1) is a — orm o — knowledge or expression covered by the statute; (2) has (a) ­independent economic value — rom being (b) not generally known and (c) not readily ascertainable by proper means; and (3) was subject to rea- sonable e —


orts to keep it secret. This standard applies at ­every stage o — litigation —­  — rom preliminary injunction to summary judgment to — inal verdict. Plainti —


s who — ail to meet it cannot prevail, no ­matter how egregious the de — endant’s conduct may appear. Proving secrecy is o — ten the most demanding ele­ment. It requires both internal and external evidence. Internally, the plainti —


must show that access was l­imited, that recipients ­were trained or bound by agreement, and that controls ­were in place to prevent leakage. Externally, the plainti —


must show that the in — ormation was not available through public sources or ­independent research. General statements that the in — ormation was “con — idential” or “valuable” are not enough. Courts expect speci — icity and structure.

                                                 Trade Secret Protection Extends to
                                                        Early-­S tage Concepts

                                                 Altavion, Inc. v. Konica Minolta Systems Laboratory, Inc.
                                                                226 Cal. App. 4th 26 (2014)
                                    Altavion disclosed a digital stamping method to Konica Minolta during dis-
                                 cussions about collaboration. Konica l­ater  --- iled patent applications covering
                                 the disclosed ideas. Altavion sued  --- or misappropriation. The court held that

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 188 1/12/26 2:51 PM 6 • En — orcing Trade Secret Rights 189

                     the in --- ormation quali --- ied as a trade secret even though it was not embodied in
                     a commercial product. It emphasized that trade secret status depends not on
                     the stage o ---  development but rather on secrecy, value, and control. Altavion had
                     documented the concept, disclosed it ­under a con --- identiality agreement, and
                     kept it out o ---  the public domain. That was enough.



                    Altavion con --- irms that trade secrets do not need to be market-­ready to be pro-
                tectable. What ­matters is ­whether the in --- ormation was treated as con --- idential and
                ­whether it con --- erred a potential advantage ­because it was not known to ­others. Early-­
                stage technical concepts, internal algorithms, and business strategies may all quali --- y
                i ---  handled with care.
                    Secrecy must also be maintained through the li --- e o ---  the dispute. In --- ormation that
                leaks during litigation or was already disclosed be --- ore the de --- endant’s alleged miscon-
                duct may lose protection. Courts  --- ocus on what was happening at the moment o ---  the
                alleged misappropriation. Plainti ---

s who — ail to monitor access or who allow secrets to spread uncontrolled may — ind that the ­legal claim evaporates —­ even i — the in — ormation still — eels proprietary.

                           Individual Discipline Can Satis --- y Reasonable
                                         Secrecy E ---

orts

                                                      Bianco v. Globus Medical, Inc.
                                                    30 F. Supp. 3d 565 (E.D. Tex. 2014)
                         Dr. Bianco disclosed a spinal implant concept to Globus Medical during dis-
                     cussions about pos­si­ble collaboration. No agreement was reached, but Globus
                     l­ater commercialized a similar design. The court held that the disclosed con-
                      cept quali --- ied as a trade secret. Although Bianco did not patent or manu --- acture
                      the device himsel --- , he had developed detailed documentation, shared it only
                      ­under con --- identiality, and kept it out o ---  the public sphere. The court awarded
                       damages based on lost licensing value.



                   Bianco demonstrates that even solo inventors and individual contributors can pre-
                vail i ---  they take  --- ormal steps to preserve secrecy. Courts do not require corporate
                in --- rastructure. They require discipline. When the evidence shows that the in --- orma-
                tion was eco­nom­ically valuable, closely held, and improperly used, protection  --- ollows.
                   What emerges  --- rom ­these cases is a picture o ---  trade secret litigation as an eviden-
                tiary challenge. The plainti ---

must show not just what the in — ormation is but how it was treated and why it ­matters. That showing must be made with precision. A trade secret cannot be proven by assertion. It must be demonstrated through documentation,

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 189 1/12/26 2:51 PM 190 6 • En — orcing Trade Secret Rights

                            access logs, contractual structure, and commercial context. That burden —­ ­proving
                            the secret —­ is the  --- irst true test o ---  ­every plainti ---

’s case.

                            6.3.1. Secrecy, Value, and Control
                               Trade secret status rests on three interrelated pillars: secrecy, economic value,
                            and control. ­These ele­ments must be proven together. In --- ormation that is secret but
                            trivial ­will not be protected. In --- ormation that is valuable but widely known is not a
                            secret. And in --- ormation that is both secret and valuable but handled carelessly may
                            be treated by the court as abandoned. Trade secret law protects only what the ­owner
                            has chosen to protect and has taken steps to keep protected over time.
                               Secrecy does not mean absolute invisibility. Courts recognize that trade secrets are
                            o --- ten shared within ­organizations and disclosed to business partners. What ­matters is
                            that the in --- ormation is not generally known or readily ascertainable and that its cir-
                            culation is controlled. Access must be ­limited. Sharing must be governed by contract
                            or clear expectation. Courts  --- requently ask: Who had access, ­under what conditions,
                            and what obligations ­were imposed?
                               Value is assessed by how the in --- ormation  --- unctions in the marketplace. Does it
                            provide a competitive edge? Could a rival replicate it easily without access to the
                            secret? Is it the result o ---  substantial investment, insight, or iteration? ­These questions
                            help distinguish trade secrets  --- rom pro --- essional knowledge or public in --- ormation
                            assembled with e ---

ort. Trade secret law protects commercial advantage derived — rom con — identiality —­ not e —


ort alone. Control is about conduct. Plainti —


s must demonstrate that they took reasonable ­measures to prevent loss o — secrecy. This includes both — ormal steps, like nondisclo- sure agreements and system restrictions, and in — ormal norms, such as access disci- pline and employee training. Courts are not interested in theoretical controls. They want to see what was actually done. A well-­dra — ted policy that was never implemented carries ­little weight. A pattern o — con — idential treatment that can be corroborated by witnesses and rec­ords carries much more. ­These ­ — actors o — ten rise and — all together. Weak controls cast doubt on ­whether the in — ormation was secret. Ambiguous documentation casts doubt on value. The plainti —


                            must weave a coherent narrative showing that the in --- ormation was distinctive, closely
                            held, and signi --- icant. That narrative must be supported by evidence, and it must hold
                            up when challenged ­under oath.


                            6.3.2. Evidentiary Burdens and Typical De --- enses
                               Once litigation begins, the burden shi --- ts  --- rom pleading to proo --- . The plainti ---

must not only describe the trade secret with speci — icity but also support each ele­ment with admissible evidence. This includes showing what the trade secret is, how it was pro- tected, when it was misappropriated, and by whom. ­These are not abstract questions.

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 190 1/12/26 2:51 PM 6 • En — orcing Trade Secret Rights 191

                Courts require concrete,  --- act-­speci --- ic answers, and de --- endants o --- ten mount aggressive
                challenges to each part o ---  the claim.
                   At summary judgment, the plainti ---

must pre­sent evidence su —


icient to create a triable issue o —


act. That includes documents, sworn testimony, internal rec­ords, and expert analy­sis. Vague statements that the in — ormation was “con — idential” or “impor­ tant to the business” are not enough. Courts look — or speci — icity: the exact nature o —

                the secret, the mechanisms o ---  protection, the ways in which it was used, and how it
                provided a competitive advantage. Plainti ---

s who — ail to provide that detail may lose without reaching trial. De — endants o — ten attack trade secret claims by arguing that the in — ormation was not actually secret or that it was already known in the industry. They may introduce evidence — rom public websites, academic publications, prior patents, or testimony


rom industry pro — essionals to show that the in — ormation could have been obtained through proper means. I — the trade secret is — unctionally available to ­others, the claim


ails, regardless o — ­whether the de — endant actually used ­those sources. Another common de — ense is that the plainti —



ailed to take reasonable steps to pro- tect the in — ormation. This is o — ten supported by pointing to gaps in documentation, inconsistent en — orcement o — policies, or in — ormal practices that allowed broad access. For example, a com­pany that stores all — iles on an open-­access server or — ails to revoke credentials — or — ormer employees may strug­gle to show control. Courts weigh ­these


acts heavi­ly when deciding ­whether the plainti —


met its burden. A related de — ense is that the de — endant developed the in — ormation in­de­pen­dently. I — the de — endant can show that its work was derived — rom public sources, internal expertise, or a development timeline that preceded any alleged disclosure, that can de — eat the claim. Courts do not presume misappropriation merely ­because the end product is similar. They require proo — that the secret was taken and that it made a di —


erence. ­These de — enses underscore the central real­ity o — trade secret litigation: plainti —


s bear the burden not only to claim secrecy but also to prove it —­ ­under conditions where the de — endant is ­ — ree to deny, distinguish, and reinterpret the — acts. That burden is signi — icant. It can be met, but only with care — ul preparation, detailed rec­ords, and internal discipline that existed long be — ore the lawsuit began.

                6.3.3. Litigation-­Stage Reasonableness Analy­sis
                    The question o ---  ­whether reasonable e ---

orts ­were taken to maintain secrecy is not assessed in the abstract. Courts evaluate it based on what the plainti —


actually did be — ore and during the alleged misappropriation. This includes how the in — orma- tion was stored, labeled, transmitted, and accessed; what policies ­were in place; and ­whether ­those policies ­were — ollowed in practice. Crucially, courts examine ­whether secrecy was preserved at the time o — the alleged breach, not just at some ­earlier stage when the in — ormation may have — irst been developed.

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 191 1/12/26 2:51 PM 192 6 • En — orcing Trade Secret Rights

                               This litigation-­stage assessment o --- ten reveals weaknesses in trade secret protection
                            systems that went unnoticed internally. For example, a com­pany may have required
                            employees to sign nondisclosure agreements but never trained them on how to ­handle
                            con --- idential  --- iles. Or a system may have had theoretical access controls, but the pass-
                            word was shared among teams or never changed. ­These kinds o ---  implementation

ailures ­matter. Courts do not en — orce good intentions. They en — orce what actually happened. Timing also plays a key role. Trade secrets can be lost by exposure. I — a plainti —


                            allowed in --- ormation to circulate without restrictions or  --- ailed to notice that a third
                            party had published or leaked it, protection may be lost be --- ore the case even begins.
                            Courts ask ­whether the in --- ormation was still a trade secret at the time o ---  the alleged
                            misappropriation. I ---  secrecy had already lapsed, ­there is nothing le --- t to en --- orce.
                               Litigation also puts internal consistency ­under a microscope. Plainti ---

s who describe the same in — ormation di —


erently in di — ­ — er­ent contexts, such as telling regula- tors one story and courts another, risk undercutting their claim. So do plainti —


s who try to reclassi — y in — ormation as con — idential ­a — ter the — act. Courts look — or contem- poraneous evidence that the in — ormation was understood to be sensitive and that appropriate steps ­were taken to protect it in real time. Reasonableness is also judged relative to industry norms. Courts o — ten ask ­whether companies o — similar size and sophistication would have done more to protect similar in — ormation. This is especially true in technology, — inance, healthcare, and other — ields where expectations around data protection are evolving rapidly. A plainti —


that lags ­behind its peers may strug­gle to show that its practices ­were reasonable, particularly i — the de — endant — ollowed stronger protocols or acted based on di — ­ — er­ent assumptions about what was protected. Ultimately, this stage o — litigation reveals ­whether the com­pany’s protection e —


orts ­were built to withstand scrutiny. Trade secret law rewards structure and — oresight. The plainti —


must not only convince the court that a trade secret exists but also that it was preserved through deliberate, consistent, and timely action. That is the — oundation on which ­every remedy depends.

                                                             6.4. Injunctive Relie ---

                               Injunctive relie ---  plays a signi --- icant role in trade secret litigation, but it is not always
                            the primary remedy. The decision to grant an injunction depends on the  --- acts o ---  each
                            case, the harm caused by the alleged misappropriation, and the nature o ---  the trade
                            secret itsel --- . Injunctive relie ---  is most commonly sought when the plainti ---

can dem- onstrate that monetary damages ­will not be su —


icient to remedy the harm caused by continued use or disclosure o — the trade secret. However, courts weigh the interests o — both the plainti —


and the de — endant, balancing the need — or protection against the de — endant’s business interests.

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 192 1/12/26 2:51 PM 6 • En — orcing Trade Secret Rights 193

                   Temporary Restraining ­Orders (TROs) and preliminary injunctions are typically
                sought in the early stages o ---  litigation to prevent  --- urther harm be --- ore a  --- ull trial can
                take place. ­These  --- orms o ---  relie ---  serve to stop the de --- endant’s actions while the case is
                ongoing, but they are not permanent solutions. Permanent injunctions, issued ­a --- ter a
                trial, provide more lasting protection. The  --- ollowing subsections examine the require-
                ments and considerations  --- or granting TROs, preliminary injunctions, and perma-
                nent injunctions.


                6.4.1. Temporary Restraining ­Orders
                   A Temporary Restraining Order (TRO) is a short-­term emergency remedy that can
                be granted without notice to the de --- endant in certain situations. A TRO is typically
                issued to preserve the status quo and prevent immediate harm to the plainti ---

, such as the continued use or disclosure o — a trade secret. ­Because TROs are generally granted ex parte —­ meaning the de — endant is not pre­sent to contest the order —­ courts apply a heightened standard. The plainti —


must show that they ­will su —


er irreparable harm i —

                the TRO is not granted and that the balance o ---  hardships ­ --- avors the plainti ---

. The primary purpose o — a TRO is to stop immediate harm be — ore a — ull hearing can be held. It is a temporary ­measure that usually lasts only a — ew days to a — ew weeks, enough to give the plainti —


time to prepare — or a more comprehensive hearing on a preliminary injunction. Courts ­will grant a TRO only i — the plainti —


demonstrates that they are likely to succeed on the merits o — their case and that ­there is no adequate remedy at law. TROs are power­ — ul tools, but they are short-­lived. I — the plainti —


cannot convert the TRO into a preliminary injunction, the relie — is temporary and may not provide the long-­term protection the plainti —


seeks. Courts exercise discretion in granting TROs, recognizing that they may disrupt the de — endant’s business operations and impose burdens even be — ore the allegations are — ully tested.

                6.4.2. Preliminary Injunctions
                   A preliminary injunction is another  --- orm o ---  interim relie ---  granted be --- ore trial, but
                unlike a TRO, it is issued ­a --- ter a hearing in which both parties have the opportunity
                to pre­sent evidence. A preliminary injunction is intended to prevent  --- urther harm
                while the case is pending and is generally more comprehensive than a TRO. Courts
                issue preliminary injunctions when the plainti ---

demonstrates that ­there is a likeli- hood o — success on the merits, that irreparable harm ­will occur i — the injunction is not granted, and that the balance o — hardships ­ — avors the plainti —


. A preliminary injunction serves to protect the plainti —


’s interests while the — ull case is litigated. The plainti —


must show that they have a strong case on the under­ lying merits o — the trade secret claim: they must show not just that they may even- tually win, but that the harm to their trade secret cannot be remedied by money

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 193 1/12/26 2:51 PM 194 6 • En — orcing Trade Secret Rights

                            damages alone. In addition, the court ­will consider ­whether the de --- endant ­will su ---

er undue harm — rom the injunction and ­whether the public interest would be served by granting the order. In many trade secret cases, the harm caused by the unauthorized use or disclosure o — the trade secret cannot be adequately ­measured in monetary terms. In ­these cases, the plainti —


is likely to succeed in obtaining a preliminary injunction, particularly i —

                            they can demonstrate that the continued use o ---  the trade secret ­will undermine their
                            competitive advantage and cause ongoing damage.



                                                  “Inevitable Disclosure” Can Justi --- y
                                                       a Preliminary Injunction

                                                                  PepsiCo, Inc. v. Redmond
                                                                 54 F.3d 1262 (7th Cir. 1995)
                                    PepsiCo sought an injunction to prevent a  --- ormer employee, Redmond,

rom working — or Quaker Oats. The com­pany argued that Redmond would inevitably use PepsiCo’s con — idential pricing strategies and marketing plans at Quaker. The court held that PepsiCo had shown a reasonable likelihood o — success on the merits o — its claim and granted the injunction. The court’s decision was rooted in the inevitable disclosure doctrine, which allows — or injunctive relie — when it is shown that the de — endant’s new employment would almost certainly lead to the use o — the plainti —


’s trade secrets, even without direct disclosure.

                            6.4.3. Permanent Injunctions and
                                    Post-­Trial Remedies
                                Once a court has  --- ully adjudicated a trade secret misappropriation claim, it may
                            issue a permanent injunction to stop  --- urther harm caused by the de --- endant’s actions.
                            A permanent injunction is typically issued ­a --- ter a trial and is meant to provide long-­
                            term protection to the plainti ---

. Unlike temporary or preliminary injunctions, which are interim ­measures, a permanent injunction is intended to provide — inal relie —

                            ­a --- ter the court has determined that the de --- endant’s conduct constitutes trade secret
                             misappropriation.
                               A permanent injunction can include a range o ---  remedies, including prohibiting the
                            de --- endant  --- rom continuing to use or disclose the trade secret, requiring the return
                            o ---  con --- idential in --- ormation, and barring the de --- endant  --- rom engaging in speci --- ic
                            competitive activities  --- or a designated period o ---  time. The scope o ---  the permanent

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 194 1/12/26 2:51 PM 6 • En — orcing Trade Secret Rights 195

                injunction ­will depend on the  --- acts o ---  the case, including the nature o ---  the trade secret,
                the extent o ---  the de --- endant’s misuse, and the potential harm to the plainti ---

.

                                An Ongoing Threat o ---  Misuse Can Justi --- y
                                       a Permanent Injunction

                                                  Bimbo Bakeries USA, Inc. v. Botticella
                                                      613 F.3d 102 (3d Cir. 2010)
                        Bimbo Bakeries sought a permanent injunction to prevent Botticella, a  --- or-
                     mer employee,  --- rom using or disclosing trade secrets related to the com­pany’s
                     product  --- ormulations. The court granted the injunction,  --- inding that the com­
                     pany had demonstrated that the  --- ormer employee would use the con --- idential
                     in --- ormation in his new employment with a competitor. The court reasoned that
                     the in --- ormation was essential to Bimbo’s success and that allowing the de --- endant
                     to use it would cause irreparable harm to the com­pany’s competitive position.



                   In granting permanent injunctions, courts take into account both the de --- endant’s
                role in the misappropriation and the potential ongoing harm to the plainti ---

. A per- manent injunction serves as a long-­term sa — eguard, ensuring that the trade secrets are not — urther exploited. Courts also consider the public interest in preventing trade secret the — t and promoting — air competition, particularly in cases where the de — en- dant’s actions have broader implications — or the industry.

                                           6.5. Monetary Remedies
                     While injunctive relie ---  is o --- ten the most immediate remedy in trade secret litiga-
                tion, monetary damages are central to any case involving misappropriation. Courts
                award damages to compensate the plainti ---


or the harm caused by the misappropria- tion, to deter ­ — uture misconduct, and, in some cases, to punish egregious be­hav­ior. Monetary remedies in trade secret cases are generally divided into three categories: ­actual loss, unjust enrichment, and reasonable royalty. Each category addresses a di — ­


er­ent aspect o — the harm caused by the misappropriation and can be awarded in­de­ pen­dently or in combination, depending on the — acts o — the case. The goal o — damages is not just to compensate the plainti —


but also to ensure that the de — endant does not bene — it — rom its wrong — ul actions. Courts o — ten look at the — ull extent o — the de — endant’s misconduct and the economic advantage gained through misappropriation. In some cases, the plainti —


may not know the — ull extent o — the loss, especially i — the de — endant has used the trade secrets to develop products that have

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 195 1/12/26 2:51 PM 196 6 • En — orcing Trade Secret Rights

                            already been marketed or sold. In such cases, courts may rely on expert testimony or
                            other evidence to estimate the damages.


                            6.5.1. ­Actual Loss
                               ­Actual loss damages aim to compensate the plainti ---


or the ­actual harm caused by the de — endant’s wrong — ul actions. This category o — damages includes lost pro — its, damage to business relationships, and any other direct — inancial losses resulting — rom the misappropriation. In determining ­actual loss, courts look at how the misappro- priation has harmed the plainti —


’s competitive position, ­whether it has caused a loss o — market share, and how the de — endant’s use o — the trade secret has a —


ected the plainti —


’s ability to compete. The plainti —


must prove the extent o — its losses by presenting evidence o — the eco- nomic value o — the trade secret, the market conditions, and the amount o — business or pro — it that was lost due to the misappropriation. In some cases, the plainti —


may need to show how the de — endant’s use o — the trade secret allowed them to achieve a competitive advantage or to develop a competing product or ­service.

                                          Lost Licensing Value Can Establish ­Actual
                                                        Loss Damages

                                                                 Bianco v. Globus Medical, Inc.
                                                               30 F. Supp. 3d 565 (E.D. Tex. 2014)
                                     Dr. Bianco disclosed a spinal implant concept to Globus Medical during dis-
                                 cussions about pos­si­ble collaboration. No agreement was reached, but Globus
                                 ­later commercialized a similar design. The court awarded damages based on the
                                  licensing value o ---  the concept, recognizing that Dr. Bianco had lost the oppor-
                                  tunity to license his idea to a competitor. The award was based on the potential
                                  economic bene --- it Bianco had lost due to Globus’s use o ---  his trade secret.



                               In Bianco, the court calculated ­actual loss damages by  --- ocusing on the licensing
                            potential o ---  the trade secret. This case demonstrates that when the harm caused
                            by misappropriation is quanti --- iable —­ such as lost licensing opportunities or lost
                            sales —­ ­actual loss damages can be substantial.


                            6.5.2. Unjust Enrichment
                               Unjust enrichment damages are intended to strip the de --- endant o ---  any pro --- its
                            gained through the misappropriation o ---  trade secrets. Unlike ­actual loss, which com-
                            pensates the plainti ---


or their direct harm, unjust enrichment seeks to eliminate any

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 196 1/12/26 2:51 PM 6 • En — orcing Trade Secret Rights 197

                bene --- it the de --- endant gained  --- rom the wrong --- ul use o ---  the trade secret. This  --- orm
                o ---  damages is meant to ensure that the de --- endant does not pro --- it  --- rom their illegal
                actions.
                   In calculating unjust enrichment, courts look at the pro --- its the de --- endant made as a
                result o ---  using the trade secret, such as the value o ---  products sold or ­services provided
                using the misappropriated in --- ormation. The key question is ­whether the de --- endant’s
                pro --- its ­were directly tied to the use o ---  the trade secret and ­whether ­those pro --- its would
                have been earned without it.



                                         De --- endant’s Pro --- its  --- rom
                                    Misappropriation Can Be Awarded as
                                            Unjust Enrichment

                                                                    3M v. Pribyl
                                                            259 F.3d 587 (7th Cir. 2001)
                        3M alleged that  --- ormer employees had misappropriated proprietary trade
                     secrets regarding manu --- acturing pro­cesses. The court awarded damages based
                     on the de --- endant’s unjust enrichment, recognizing that the de --- endant’s sales
                     o ---  products developed using 3M’s trade secrets represented an un --- air pro --- it
                     gained through wrong --- ul conduct. The court emphasized that the de --- endant
                     should not bene --- it  --- rom the misappropriation.



                   In 3M v. Pribyl, the court awarded unjust enrichment damages to 3M,  --- ocusing on
                the de --- endant’s pro --- its earned  --- rom the use o ---  proprietary manu --- acturing pro­cesses.
                This case shows how courts calculate unjust enrichment damages: by looking at the
                bene --- it the de --- endant gained  --- rom the trade secrets and then determining a dam-
                ages award su ---

icient to ensure that the de — endant does not pro — it — rom its unlaw — ul conduct.

                6.5.3. Reasonable Royalty
                   In cases where ­actual loss and unjust enrichment are di ---

icult to quanti — y, courts may award damages based on a reasonable royalty. A reasonable royalty is an amount that represents what the plainti —


would have received i — the de — endant had negotiated


or the right to use the trade secret. This approach is o — ten used when the plainti —


                cannot establish ­actual loss or the de --- endant’s pro --- its; it provides a way to compensate
                the plainti ---

based on the value o — the trade secret. Reasonable royalty damages are typically calculated based on expert testimony, industry standards, and hy­po­thet­i­cal licensing negotiations. Courts may look at

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 197 1/12/26 2:51 PM 198 6 • En — orcing Trade Secret Rights

                            ­ --- actors such as the plainti ---

’s ­actual licensing history, the market value o — similar trade secrets, and the de — endant’s use o — the trade secret in its products or ­services.

                                        Misappropriation Damages Can Be Estimated
                                                by a “Reasonable” Royalty

                                                             Mattel, Inc. v. MGA Entertainment, Inc.
                                                                  616 F.3d 904 (9th Cir. 2010)
                                    In a ­battle over the Bratz dolls, Mattel alleged that MGA had used its trade
                                 secrets in the development o ---  a competing line o ---  dolls. The court awarded a
                                 reasonable royalty re --- lecting the licensing value o ---  the trade secrets that Mattel
                                 would have earned had it licensed the in --- ormation to MGA. The court relied
                                 on expert testimony to determine the value o ---  the trade secrets in the context
                                 o ---  the doll market.



                                In Mattel v. MGA Entertainment, the court awarded a reasonable royalty to Mattel

or the misappropriation o — trade secrets related to the development o — dolls. This case illustrates how reasonable royalty damages can be applied when ­actual loss or unjust enrichment is di —


icult to ­measure, and it shows how courts use expert testimony to determine the value o — the trade secret. This section illustrates how courts determine the appropriate monetary remedy depending on the — acts and circumstances o — the case. ­Actual loss compensates the plainti —



or the harm caused by the de — endant’s actions, unjust enrichment removes the de — endant’s ill-­gotten gains, and reasonable royalty damages — ill the gap when other remedies are di —


icult to calculate.

                                                             6.6. Ex Parte Seizure
                               The UTSA provides a unique and power­ --- ul remedy  --- or trade secret holders: the
                            right to seek ex parte seizure o ---  misappropriated trade secrets. This remedy allows
                            the plainti ---

to seize the de — endant’s property —­ such as documents, — iles, or electronic devices —­ be — ore the de — endant has an opportunity to contest the action. It is an extraordinary remedy, available only in speci — ic and urgent circumstances. Ex parte seizure is typically sought when ­there is a risk that the de — endant ­will destroy or con- ceal the trade secrets, or when immediate relie — is necessary to prevent irreparable harm to the plainti —


’s competitive position.

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 198 1/12/26 2:51 PM 6 • En — orcing Trade Secret Rights 199

                   The DTSA sets out an eight-­part test that must be satis --- ied be --- ore a court can grant
                ex parte seizure. ­These requirements are strict ­because o ---  the severe nature o ---  the
                remedy. Courts ­will only grant such ­orders i ---  the plainti ---

demonstrates that: 1. Immediate and irreparable harm would result — rom the misappropriation o — the trade secret. 2. The plainti —


is likely to succeed on the merits o — the trade secret claim. 3. The de — endant would destroy or move the trade secrets ­unless the court intervenes immediately. 4. The seizure is necessary to prevent — urther misuse o — the trade secrets. 5. The plainti —


has made reasonable e —


orts to preserve the con — identiality o — the trade secret. 6. The plainti —


has provided su —


icient in — ormation about the trade secret and the misappropriation. 7. The harm to the de — endant — rom the seizure does not outweigh the harm to the plainti —


. 8. The plainti —


has provided an adequate bond to cover potential damages to the de — endant. ­These criteria re — lect the exceptional nature o — the seizure remedy. It is a drastic ­measure, which is why the law requires plainti —


s to prove an immediate need — or relie —

                 that is backed by strong evidence o ---  misappropriation and the likelihood o ---  harm. Ex
                 parte seizure is not typically used  --- or routine trade secret disputes but  --- or cases where
                 the de --- endant’s conduct has been egregious and time is o ---  the essence.



                                   An Ex Parte Seizure Requires a Strong
                                    Showing o ---  Extraordinary Urgency

                                           Janssen Prods. L.P. v. Evenus Pharms. Labs. Inc.
                                                     85 F.4th 147 (3d Cir. 2023)
                        Janssen Phar­ma­ceu­ti­cals sought an ex parte seizure order to recover misap-
                     propriated trade secrets  --- rom Evenus Phar­ma­ceu­ti­cals, alleging that Evenus
                     was using con --- idential data related to drug  --- ormulations. The court denied
                     the seizure,  --- inding that Janssen had not shown the urgency or imminent risk
                     required  --- or such an extraordinary remedy. The decision rein --- orced the narrow
                     application o ---  ex parte seizure ­under the DTSA, emphasizing that it is avail-
                     able only in situations where the de --- endant’s actions pose an immediate and
                     irreparable threat to the plainti ---

’s business interests.

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 199 1/12/26 2:51 PM 200 6 • En — orcing Trade Secret Rights

                               A court’s decision to grant an ex parte seizure order is based on rigorous standards
                            that plainti ---

s must meet to obtain the remedy. While Janssen presented a strong case o — misappropriation, the court — ound that the evidence did not meet the high thresh- old required — or such drastic action. This case demonstrates how courts weigh the urgency o — the situation and the potential harm to both the plainti —


and de — endant be — ore granting such an intrusive remedy. Ex parte seizure is a power­ — ul tool, but its application is ­limited. Plainti —


s who seek seizure ­orders must demonstrate not just that they have a valid claim but also that the de — endant’s actions are likely to cause immediate and irreparable harm. This remedy is used sparingly and is generally reserved — or cases where ­there is clear evidence o —

                            concealment or destruction o ---  trade secrets.
                                Even when the seizure order is granted, it is not a comprehensive solution. Once
                            the in --- ormation is seized, the plainti ---

must still go through the normal litigation ­process to prove the existence o — the trade secret, misappropriation, and the appro- priate remedy. The seizure order serves as an emergency intervention, not as a — inal judgment in the case.

                                                        6.7. Attorneys’ Fees and
                                                          Enhanced Damages
                               In addition to compensating plainti ---

s — or their ­actual loss or unjust enrichment, trade secret law provides — or the recovery o — attorneys’ — ees and, in some cases, enhanced damages. ­These remedies are particularly relevant when the de — endant’s conduct is — ound to be will — ul, malicious, or other­wise egregious. The goal is to deter wrong — ul conduct and to ensure that trade secret ­owners are not penalized — or having to bring a lawsuit to protect their secrets. The UTSA and the DTSA both allow — or the award o — attorneys’ — ees in cases where the de — endant’s misappropriation is deemed will — ul and malicious. Courts are gener- ally reluctant to award — ees in trade secret cases, but when they do, it is o — ten ­because the de — endant’s conduct has been particularly egregious or has involved bad-­ — aith litigation tactics. Attorneys’ — ees serve as a deterrent and as a means o — compensating the plainti —



or the expense o — de — ending its rights. In cases where the misappropriation was will — ul, courts may also award enhanced damages. ­Under the UTSA and the DTSA, enhanced damages can be awarded up to two times the amount o — ­actual damages, provided the de — endant’s conduct was egre- gious. This means that i — the de — endant acted with knowledge that their actions ­were wrong — ul or with deliberate disregard — or the plainti —


’s rights, the court may increase the damages award to provide a stronger deterrent. One example o — a case where enhanced damages ­were awarded — or will — ul conduct is Amnet v. CrossCountry Mortgage. In that case, the de — endant was — ound to have

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 200 1/12/26 2:51 PM 6 • En — orcing Trade Secret Rights 201

                knowingly misappropriated the plainti ---

’s trade secrets and to have engaged in bad-­


aith litigation tactics. As a result, the court awarded attorneys’ — ees and enhanced damages to the plainti —


. This case highlights how courts ­will use ­these remedies to punish de — endants who act with disregard — or the law and to prevent them — rom pro — - iting — rom wrong — ul conduct.

                                Will --- ul and Malicious Misappropriation
                                    Can Trigger Enhanced Damages

                                                  Amnet v. CrossCountry Mortgage
                                              2020 WL 3489317 (N.D. Ill. June 26, 2020)
                        Amnet accused CrossCountry Mortgage o ---  misappropriating its proprietary
                     mortgage underwriting so --- tware. The court  --- ound that CrossCountry had will-

ully misappropriated the so — tware, and it awarded Amnet both attorneys’ — ees and enhanced damages. The court noted that CrossCountry had engaged in bad-­ — aith litigation by attempting to delay the proceedings and avoid produc- ing key evidence. The award o — enhanced damages was aimed at punishing this conduct and deterring similar be­hav­ior in the ­ — uture.

                   The award o ---  attorneys’  --- ees and enhanced damages emphasizes that trade secret
                law is not just about compensating the plainti ---


or losses. It is also about ensuring that the de — endant is not allowed to bene — it — rom wrongdoing and to deter — ­uture violations. ­These remedies are particularly impor­tant in cases where the de — endant’s actions ­were not merely negligent but involved will — ul misconduct. I — the court — inds that the de — endant’s be­hav­ior was particularly egregious or mali- cious, it may impose additional penalties as part o — its judgment. This serves as a warning to potential de — endants that misappropriating trade secrets or engaging in bad-­ — aith litigation ­will have signi — icant ­legal consequences beyond the standard dam- ages award.

                                        6.8. Criminal En --- orcement
                   While trade secret misappropriation is primarily a civil ­matter, ­there are circum-
                stances where the the --- t o ---  trade secrets can lead to criminal prosecution ­under the
                Economic Espionage Act (EEA). The EEA criminalizes the the --- t or misappropriation
                o ---  trade secrets with the intent to bene --- it a  --- oreign government or to gain a competi-
                tive advantage. The law provides  --- or signi --- icant penalties, including  --- ines and impris-
                onment,  --- or ­those  --- ound guilty o ---  trade secret the --- t ­under criminal statutes.

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 201 1/12/26 2:51 PM 202 6 • En — orcing Trade Secret Rights

                               The key di ---

erence between civil and criminal en — orcement is the burden o — proo — . In criminal cases, the government must prove its case beyond a reasonable doubt, which is a higher standard than the “preponderance o — the evidence” standard used in civil cases. This makes criminal en — orcement more di —


icult to pursue. Criminal pros- ecution is typically reserved — or cases involving large-­scale the — t, industrial espionage, or the — t with — oreign connections. ­Under the EEA, penalties — or criminal misappropriation can be severe. Individu- als convicted ­under the Act can — ace up to 10 years in prison and — ines up to $5 mil- lion. ­Organizations — ound guilty o — violating the Act may — ace even larger penalties, including — ines o — up to $10 million or three times the value o — the stolen trade secrets, whichever is greater. The EEA’s criminal provisions are designed to serve as a deter- rent, particularly in cases o — economic espionage, where the the — t o — trade secrets can undermine national security or economic interests. Although criminal en — orcement is less common in trade secret cases, it plays an impor­tant role in deterring high-­level the — t, particularly when the de — endant’s con- duct involves — oreign governments or actors. The government may initiate a criminal investigation and prosecution in­de­pen­dently o — any civil case, or criminal charges may be brought alongside a civil claim.

                                      The Economic Espionage Act Imposes Criminal
                                            Liability  --- or Trade Secret “The --- t”

                                                                  United States v. Aleynikov
                                                                  676 F.3d 71 (2d Cir. 2012)
                                     In this case, Sergey Aleynikov, a  --- ormer employee o ---  Goldman Sachs, was
                                 convicted ­under the Economic Espionage Act  --- or stealing proprietary computer
                                 code related to high-­ --- requency trading algorithms. Aleynikov had downloaded
                                 the code to his personal computer be --- ore leaving the com­pany, intending to use
                                 it  --- or a ­ --- uture employer. The court  --- ound that the trade secrets in question ­were
                                 valuable to Goldman Sachs, and Aleynikov’s actions ­were in violation o ---  the
                                 EEA. His conviction was overturned on appeal due to technical issues in how
                                 the law was applied, but the case demonstrated the reach o ---  criminal en --- orce-
                                 ment  --- or trade secret the --- t.



                               The Aleynikov case illustrates the broad scope o ---  the Economic Espionage Act and
                            how it applies to high-­level the --- t in the  --- inancial industry. It shows that criminal liabil-
                            ity can attach even when the misappropriation is not immediately damaging to the
                            original com­pany, especially when the trade secret involved has substantial value in
                            the industry or national security context.

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 202 1/12/26 2:51 PM 6 • En — orcing Trade Secret Rights 203

                   The key advantage o ---  criminal prosecution is the severity o ---  the penalties. Crimi-
                nal de --- endants  --- ace not only  --- inancial penalties but also the threat o ---  imprisonment.
                This makes criminal en --- orcement an impor­tant tool  --- or deterring large-­scale the --- t
                and espionage. However, ­because the burden o ---  proo ---  in criminal cases is so high, the
                government typically only pursues criminal prosecution in cases o ---  clear and egre-
                gious misconduct.
                    Criminal en --- orcement also intersects with civil trade secret claims in certain cases.
                It is not uncommon  --- or a de --- endant who is  --- acing civil litigation  --- or trade secret mis-
                appropriation to also be prosecuted criminally, especially i ---  the case involves  --- oreign
                espionage or the the --- t o ---  highly sensitive in --- ormation. In ­these cases, the civil case may
                proceed in­de­pen­dently o ---  the criminal prosecution, but the potential  --- or criminal
                penalties adds an additional layer o ---  deterrence and consequence.



                                     6.9. Strategic and Procedural
                                               Dynamics
                    In trade secret litigation, the ­legal arguments are only part o ---  the story. The strategy
                ­behind the case —­ how and when to  --- ile, how to manage discovery, and how to pre­
                 sent the evidence —­ can determine the outcome just as much as the substance o ---  the
                 claims. Trade secret cases o --- ten involve highly con --- idential and technical in --- ormation,
                 and the parties ­will ­battle not just over ­legal de --- initions but also over how the  --- acts are

ramed and how the law is applied to the evidence. One o — the — irst strategic decisions involves venue and jurisdiction. This decision can a —


ect the entire course o — the case, — rom how quickly it moves through the court system to what rules govern the litigation. ­A — ter — iling, the litigation strategy continues with critical decisions about discovery —­ what evidence to pursue and how to protect con — idential materials during the ­process. This section breaks down ­these strategic considerations and explains how to navigate them.

                6.9.1. Venue and Jurisdiction
                    Choosing the right venue is critical in trade secret litigation. The rules that apply
                to trade secret claims can vary depending on the jurisdiction, and where a case is

iled can signi — icantly impact both procedural and substantive outcomes. For — ederal claims brought ­under the DTSA, venue is governed by the general — ederal venue stat- ute, 28 USC § 1391. This means a DTSA claim may be brought in any — ederal district where a de — endant resides or where a substantial part o — the events giving rise to the claim occurred. While plainti —


s do not have un — ettered discretion to choose any district court, they may still have some strategic — lexibility in selecting among proper

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 203 1/12/26 2:51 PM 204 6 • En — orcing Trade Secret Rights

                            venues,  --- or example, by  --- avoring jurisdictions with experience in complex intellectual
                            property litigation or ­those where the de --- endant has a business presence.
                               However, when a trade secret claim is brought ­under state law —­ such as ­under a
                            state’s adoption o ---  UTSA —­ venue is determined by the relevant state’s venue statutes
                            and rules o ---  civil procedure. Typically, venue is proper in the county or judicial district
                            where the de --- endant resides, where the misappropriation occurred, or where the injury
                            was sustained. However, trade secret ­owners should care --- ully evaluate not only the
                            substantive law but also the local court’s experience and receptivity to complex com-
                            mercial or intellectual property cases, as some jurisdictions are more  --- amiliar with the
                            nuances o ---  trade secret law and may administer the litigation more e ---

ectively. For example, in a case involving multiple jurisdictions —­ such as when the misap- propriation took place in one state but the de — endant operates nationally or inter- nationally —­ the plainti —


may need to assess the ­convenience o — the venue — or their witnesses, the location o — the evidence, and ­whether the chosen court has experience ­handling multijurisdictional litigation.

                                              Strategic Venue Se­lection Can Provide
                                                     Procedural Advantages

                                                                   Amgen, Inc. v. Sandoz Inc.
                                                                 791 F.3d 1313 (Fed. Cir. 2015)
                                     In this case, Amgen sued Sandoz  --- or trade secret misappropriation in rela-
                                 tion to a biologic drug. The court  --- ound that Amgen had selected an appro-
                                 priate venue  --- or its case, emphasizing that the venue chosen had the proper
                                 jurisdiction and experience in ­handling complex intellectual property claims.
                                 The court’s analy­sis demonstrated the strategic value o ---  venue se­lection in IP
                                 litigation.



                               This case highlights the importance o ---  making care --- ul venue decisions early on.
                            Strategic venue choices can impact procedural advantages, such as access to special-
                            ized judges or the speed with which the case progresses.


                            6.9.2. Discovery, Protective ­Orders, and
                                    Evidence Management
                               Discovery is a critical phase in trade secret litigation. Plainti ---

s and de — endants alike must be prepared to ­handle highly sensitive and con — idential in — ormation, and the management o — this data can determine ­whether the case proceeds smoothly or

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 204 1/12/26 2:51 PM 6 • En — orcing Trade Secret Rights 205

                becomes bogged down in disputes over access and secrecy. Trade secret ­owners o --- ten

ace the challenge o — ensuring that their con — idential materials remain protected dur- ing discovery, particularly when they are shared with experts, ­consultants, or oppos- ing counsel. A protective order is essential in t­hese cases. Courts routinely issue protective ­orders to ensure that con — idential in — ormation disclosed during discovery is not mis- used or disclosed outside the bounds o — the litigation. Protective ­orders pursuant to FRCP 26(c) can limit access to speci — ic individuals (such as attorneys or experts) and establish protocols — or how con — idential documents should be handled, stored, and destroyed. Plainti —


s seeking a protective order must typically demonstrate that the in — ormation quali — ies as a trade secret and that its disclosure would cause harm to their business. De — endants may seek to limit the plainti —


’s ability to review certain documents or restrict the plainti —


’s access to speci — ic con — idential in — ormation, arguing that the documents are irrelevant or not properly protected ­under the trade secret claim. Courts are o — ten tasked with balancing the need — or — ull disclosure with the protec- tion o — sensitive materials. This makes e —


ective evidence management a crucial aspect o — trade secret litigation. Plainti —


s must ensure that they can prove their trade secret status with admissible evidence while minimizing the risk o — improper disclosure.

                                 Protective ­Orders Can Limit Disclosure
                                            During Discovery

                                                  Bimbo Bakeries USA, Inc. v. Botticella
                                                      613 F.3d 102 (3d Cir. 2010)
                        In this case, Bimbo Bakeries sought to protect its trade secrets during dis-
                     covery in a case involving  --- ormer employees who disclosed con --- idential busi-
                     ness plans. The court issued a protective order to limit the distribution o ---

                     con --- idential documents to a select group o ---  experts and attorneys. The decision
                     rein --- orced the importance o ---  managing sensitive materials during litigation to
                     prevent  --- urther harm or misuse.



                   Bimbo Bakeries, an o --- t-­cited case in trade secret law, highlights the practical neces-
                sity o ---  securing protective ­orders during discovery. A well-­managed discovery ­process
                helps ensure that con --- idential materials are not disclosed beyond the litigation team,
                and it reduces the likelihood o ---  inadvertent disclosure.

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 205 1/12/26 2:51 PM 206 6 • En — orcing Trade Secret Rights

                            6.9.3. Summary Judgment and Early
                                    Disposition
                               Trade secret cases are complex and o --- ten heavi­ly reliant on  --- actual disputes. How-
                            ever, ­there are instances where a case can be resolved be --- ore trial through summary
                            judgment. In trade secret litigation, summary judgment motions typically arise when
                            one party argues that the plainti ---

has not met its burden o — proo — or that the de — en- dant’s actions do not quali — y as misappropriation ­under the law. Summary judgment motions are particularly impor­tant when the evidence is clear or when one party’s claims — ail to meet the necessary l­egal standards. For example, a plainti —


may — ail to identi — y a protectable trade secret, or a de — endant may dem- onstrate that they in­de­pen­dently developed the alleged trade secret. In such cases, summary judgment can be used to eliminate claims that are — actually unsupported.

                                           Plainti ---

s Must Prove Secrecy-­i n-­Fact to Survive Summary Judgment

                                                                   Air --- acts, Inc. v. Amezaga
                                                                  909 F.3d 84 (4th Cir. 2018)
                                      In this case, the court granted summary judgment in ­ --- avor o ---  the de --- endant
                                 ­because the plainti ---

had not demonstrated that its data quali — ied as a trade secret. The court emphasized that without adequate evidence showing that the data was treated as con — idential, the case could not proceed to trial. This decision illustrates the importance o — strong — actual evidence in trade secret litigation.

                               The Air --- acts case highlights how summary judgment can serve as a tool  --- or de --- en-
                            dants in trade secret litigation. When plainti ---

s — ail to prove the basic ele­ments o — trade secret protection, including secrecy and reasonable e —


orts to protect the in — ormation, courts may dismiss the claim be — ore trial.

                            6.9.4. Litigation Timing and Investigative
                                    Coordination
                               In trade secret litigation, timing is crucial. Once a trade secret is misappropri-
                            ated, time is o ---  the essence. The longer the de --- endant uses or discloses the trade
                            secret, the greater the harm to the plainti ---

’s competitive position. Plainti —


s must act quickly to preserve evidence and secure injunctions. Courts are more likely to grant

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 206 1/12/26 2:51 PM 6 • En — orcing Trade Secret Rights 207

                injunctive relie ---  when the plainti ---

can show that they acted swi — tly upon discovering the misappropriation. Timing is also impor­tant in managing the investigative ­process. Trade secret claims o — ten involve complex technical details, and both sides may rely on expert testimony to explain the value o — the trade secret and how it was misappropriated. Ensuring that investigations are thorough but not overly prolonged is critical to maintaining momentum in the litigation. Coordination among ­legal teams, — orensic experts, and internal stakeholders helps ensure that all relevant evidence is gathered and preserved in a timely manner.

                                     Unreasonable Delay Can Jeopardize
                                             Injunctive Relie ---


                                           Janssen Prods. L.P. v. Evenus Pharms. Labs. Inc.
                                                     85 F.4th 147 (3d Cir. 2023)
                        Janssen sought to recover misappropriated trade secrets related to drug

ormulation methods. However, the court — ound that Janssen had delayed its response and — ailed to take action quickly enough to mitigate the harm. This delay weakened its case — or immediate injunctive relie — . The court’s decision highlighted the importance o — timely litigation and investigation in protecting trade secrets.

                   The Janssen case underscores the critical role that timing plays in trade secret liti-
                gation. Delays in taking action, especially in seeking protective relie ---  or noti --- ying the
                court o ---  misappropriation, can signi --- icantly damage the plainti ---

’s chances o — success.

                                        6.10. En --- orcement Plans as
                                             Reasonable Steps
                   Trade secret en --- orcement is a dynamic ­process that hinges on both l­egal princi­
                ples and practical realities. Unlike intellectual property rights that are granted auto-
                matically, trade secrets are only protected when the ­owner takes reasonable steps to
                preserve their con --- identiality. The protection provided by the law is not absolute, and
                the ­measures required to keep secrets sa --- e are not static —­ they evolve with the nature
                o ---  the in --- ormation, the business environment, and the relationships through which
                the secrets  --- low. En --- orcement o ---  trade secret rights re --- lects not only the value o ---  the
                in --- ormation at issue but also the strength o ---  the systems in place to sa --- eguard it.

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 207 1/12/26 2:51 PM 208 6 • En — orcing Trade Secret Rights

                               In this chapter, we have explored the core tools  --- or en --- orcing trade secrets: prov-
                            ing the existence o ---  a trade secret, understanding the l­egal de --- initions o ---  misappro-
                            priation, securing remedies through injunctive relie ---  and damages, and managing
                            the strategic dynamics o ---  the litigation ­process. We have also examined the proce-
                            dural hurdles that plainti ---

s — ace in ensuring that their claims survive early dismissal, including the necessity o — proving secrecy, value, and reasonable e —


orts to maintain con — identiality. One key takeaway — rom this chapter is that en — orcement does not exist in a vac- uum. The e —


ectiveness o — a trade secret lawsuit is deeply connected to the protection e —


orts that precede it. The ability to prove a trade secret claim rests not just on ­legal arguments but also on the robustness o — the com­pany’s protection system. Courts ­will evaluate ­whether the trade secret was treated as such at ­every stage, — rom internal policies to contractual agreements to the technical systems used to restrict access. When ­those protections are weak or inconsistent, even the most valid claim o — misap- propriation can — alter. As we transition to the next chapter, it is impor­tant to consider that trade secret protection is not just a ­legal issue. It is a strategic one —­ a combination o — ­legal — rame- works, technical in — rastructure, business policies, and com­pany culture. Building a robust Trade Secret Protection Plan (TSPP) requires a multidisciplinary approach. The TSPP is not merely a set o — ­legal documents. It is a blueprint — or how a com­pany treats its con — idential in — ormation. It involves clear communication across depart- ments; coordination among ­legal, technical, and business teams; and a commitment to upholding con — identiality at ­every level o — the ­organization.

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 208 1/12/26 2:51 PM Chapter 7 The Living TSPP: Sustaining and Adapting Trade Secret Protection

                   Throughout this book, you have been building a ­house  --- or your trade secrets: lay-
                ing a  --- oundation, erecting walls, and installing systems to keep your most valuable
                knowledge secure. You have learned how to identi --- y secrets, assess risks, and imple-
                ment sa --- eguards. You have dra --- ted policies, trained employees, and operationalized a
                TSPP that works in practice. In short, you have acted as the builder and the technician
                by making sure each cir­cuit connects and ­every door locks.
                    Now, this chapter invites you to become the architect and the structural engineer.
                It asks not just how trade secret protection works but also why it works. Why does the
                law require “reasonable e ---

orts”? Why do courts ­ — avor injunctions in some cases and damages in ­others? Why do some NDAs en — orce secrecy, while ­others collapse ­under scrutiny? ­These are not just philosophical questions. They de — ine the outer limits o —

                what your TSPP can do.
                   ­Legal protection  --- or trade secrets does not come  --- rom  --- ormality alone. It comes

rom courts’ seeing genuine, continuous e —


ort —­ and that standard is rooted in theory as much as practice. The “reasonable e —


orts” requirement, — or instance, re — lects pol- icy tradeo —


s between innovation and competition, — lexibility and — airness. Likewise, en — orcement strategy draws on — oundational debates about property rules and liability rules, while ­organizational design raises questions about ­whether secrecy is a control mechanism or a learned routine. This chapter introduces ­those debates, not as abstract theory but rather as the sca — -


olding ­behind the ­legal rules and business strategies you have already encountered. Each section sur — aces a core tension and then explores how courts, scholars, and ­organizations have tried to resolve it. You ­will meet in — luential voices in the — ield, — rom economists to doctrinal theorists, and see how their work shapes (and complicates) everyday decisions about NDAs, training, audits, and AI governance. By the end o — this chapter, you ­will not just know how to protect secrets —­ you ­will understand why some strategies work, why ­others back — ire, and how to cra — t a TSPP

                                                            209

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 209 1/12/26 2:51 PM 210 7 • Sustaining and Adapting Trade Secret Protection

                            that evolves with both law and context. You ­will be ready to lead the conversation, not
                            just  --- ollow the checklist.



                                                  7.1. The Li --- ecycle o ---  a TSPP:
                                                      Why Static Plans Fail
                                A Trade Secret Protection Plan (TSPP) is not a checklist to complete and  --- ile away.
                            It is a living system that must evolve with your ­organization and adapt to new risks,
                            technologies, and business realities. The law recognizes this by requiring “reasonable
                            e ---

orts” to maintain secrecy —­ not just at the outset, but continuously over time. To understand why, we must look beyond black-­letter law to the ­legal doctrines, economic incentives, and policy debates that shape trade secret protection across its li — ecycle. At the heart o — trade secret law is the princi­ple that protection is not automatic. Courts require companies to take vis­i­ble, active steps to sa — eguard their secrets —­ not as a — ormality but instead as a core doctrinal requirement. This emphasis on ongo- ing e —


ort is grounded in economic theory. Brian Love argues that trade secret law’s primary — unction is not simply to reward innovation but also to prevent — irms — rom relying on socially harm — ul sel — -­help ­measures. Without l­egal recourse, companies might over-­invest in secrecy or impose sweeping contractual restrictions that chill mobility and sti — le competition. The “reasonable e —


orts” standard encourages sys- tematic, transparent protection strategies that balance the interests o — innovators, competitors, and the public.

                                                            Theory in Tension

                                          Does Trade Secret Law Incentivize or Chill Innovation?
                                    Trade secret law is o --- ten de --- ended on incentive grounds: by allowing  --- irms to
                                 keep valuable know-­how con --- idential, the law encourages investment in inno-
                                 vation and knowledge creation. This logic is well-­articulated in Landes and
                                 Posner’s The Economic Structure o ---  Intellectual Property Law, where
                                 they describe trade secrets as a “second-­best” mechanism  --- or capturing returns
                                 on innovation without the disclosure costs o ---  patenting.
                                    But that same logic has critics. David Levine and Joshua Sarno ---

argue that overbroad trade secret protection can create an “in — ormation paradox”:


irms may assert secrecy over in — ormation that should be disclosed, such as public health data or algorithmic bias, thereby undermining transparency,

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 210 1/12/26 2:51 PM 7 • Sustaining and Adapting Trade Secret Protection 211

                     competition, and accountability. In their view, trade secrecy can  --- unction as a
                     regulatory shield impeding disclosure obligations that serve the public interest.
                        This tension has real implications  --- or TSPP design. Should a  --- irm treat all
                     business knowledge as protectable or reserve that label  --- or genuinely propri-
                     etary innovations? The more aggressive the claim, the greater the l­egal risk,
                     especially i ---  disclosure becomes necessary or compelled. A living TSPP must
                     walk this line: strong enough to protect valuable assets but mind --- ul o ---  the
                     public-­ --- acing risks o ---  overreach.



                   Levine and Sarno ---

’s work regards how trade secret law can undermine public interests, and it highlights the complexity o — the “in — ormation paradox”: it is o — ten impossible to determine ­whether in — ormation should be protected or disclosed with- out revealing it — irst. This dilemma sits at the heart o — many con­temporary disputes,


rom biased algorithms to toxic spills. Courts and policymakers are more sensitive than ever to the risks o — overprotection, making vigilance and adaptability essential. Empirical work rein — orces ­these insights. Ivan Png’s study o — UTSA adoption — inds that stronger trade secret protections correlate with increased R&D investment in secrecy-­intensive sectors. This evidence supports the view that robust TSPPs do more than check a box. They — uel innovation and rein — orce competitive advantage. To remain e —


ective, TSPPs must be treated as adaptive systems. They should be revisited ­a — ter business pivots, technology shi — ts, or leadership changes. Training must continue beyond onboarding, and ­organizations must establish — eedback channels to learn — rom incidents and near-­misses. ­These are not “nice to haves.” ­They’re part o —

                what makes a TSPP legally credible.
                   Consider a  --- ast-­growing startup. At  --- irst, the ­ --- ounders implement NDAs, restrict
                access to code, and manage every­thing themselves. But as they scale, new hires arrive,
                access spreads, and the original protocols  --- ray. When litigation arises, a court  --- inds
                no consistent pattern o ---  reasonable e ---

ort, and the com­pany loses protection. This scenario is not uncommon. It shows that even strong initial controls ­will — ail without


ollow-­through. By rooting your TSPP in both doctrine and economic logic, you move — rom rote compliance to strategic stewardship. You are not just en — orcing secrecy. You are build- ing an adaptive, de — ensible system that evolves with your ­organization.

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 211 1/12/26 2:51 PM 212 7 • Sustaining and Adapting Trade Secret Protection

                                        7.2. Property Rules, Liability Rules,
                                             and En --- orcement Strategy
                               Trade secret law is distinguished not only by its requirement  --- or ongoing protec-
                            tion but also by the nature o ---  the remedies it provides. A  --- oundational distinction,  --- irst
                            articulated by Guido Calabresi and A. Douglas Melamed, divides l­egal entitlements
                            into property rules and liability rules. This  --- ramework is essential  --- or understanding
                            how courts en --- orce trade secret rights and how companies should design en --- orcement
                            strategies.
                               Property rules allow the ­owner to prevent unauthorized use through injunctive
                            relie --- . In trade secret law, this means that courts ­will o --- ten issue injunctions to stop
                            misappropriation, recognizing that once a secret is disclosed, its value may be irre-
                            trievably lost. The law’s pre --- erence  --- or property rules re --- lects its concern with preserv-
                            ing exclusivity and the irreparable harm that can result  --- rom disclosure.
                               Liability rules, by contrast, permit unauthorized use so long as the user pays com-
                            pensation. While trade secret doctrine generally de --- aults to property rules, liability
                            rules emerge in certain contexts: compulsory licensing during emergencies, strategic
                            business resolutions, or government-­imposed access mandates. In such cases, courts
                            may award damages instead o ---  blocking use altogether.



                                                                    Remedy Design

                                                            Should Misappropriation Be ­Stopped
                                                                   or Just Compensated?
                                    Trade secret remedies operate on a spectrum between property rules
                                 (injunctions barring use) and liability rules (damages  --- or unauthorized use).
                                 Calabresi and Melamed’s  --- oundational  --- ramework explains this dichotomy:
                                 property rules protect exclusivity, while liability rules permit use with compen-
                                 sation. In trade secret law, courts traditionally ­ --- avor property rules —­ issuing
                                 injunctions to prevent irreversible harm  --- rom disclosure.
                                    But this pre --- erence  --- ­aces modern challenges. Levine and Sarno ---

argue that in public health crises (e.g., vaccine production shortages), liability rules should temporarily override secrecy to allow compulsory licensing o — trade secrets. Similarly, Mark Lemley notes that in — ast-­moving tech markets, injunc- tions can sti — le — ollow-on innovation by locking competitors out o —


ounda- tional knowledge. For TSPP designers, the implication is strategic: anticipate when to seek exclusion and when to seek compensation. Property rules remain the de — ault

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 212 1/12/26 2:51 PM 7 • Sustaining and Adapting Trade Secret Protection 213


or core secrets —­ but liability rules may better serve the — irm when public inter- est demands access, when litigation lags ­behind market cycles, or when secrecy is only partially breached. In each case, en — orcement planning must re — lect both doctrinal realities and ethical considerations.

                   This distinction has direct implications  --- or TSPP en --- orcement. Companies should
                plan  --- or swi --- t action to stop unauthorized use —­ knowing that courts generally ­ --- avor
                injunctions —­ but also prepare  --- or liability-­based outcomes in exceptional cases.
                E ---

ective strategy requires documenting misappropriation clearly and early, selecting


orums that align with en — orcement goals, and evaluating ­whether monetary remedies may sometimes serve business or public needs better than exclusion. Recent scholarship has explored the bound­aries o — this — ramework. Levine and Sarno —


, — or example, argue — or broader use o — liability rules in cases where secrecy thwarts urgent public needs —­ like access to phar­ma­ceu­ti­cal know-­how or environ- mental disclosures. Their work underscores the need — or — lexibility and ethical sensi- tivity in trade secret en — orcement. By grounding en — orcement in this property/liability — ramework, TSPPs become not only more doctrinally sound but also more responsive to real-­world risks and opportunities. The goal is not simply to protect secrets at all costs but to deploy ­legal tools strategically, in ways that align with both ­legal trends and market realities.

                                  7.3. The Contract–­Trade Secret
                                             Inter --- ace
                    Trade secret protection is deeply intertwined with the use o ---  contracts, which serve
                as both evidence o ---  protection e ---

orts and substantive tools — or de — ining rights and obligations. Deepa Varadarajan’s scholarship provides a — oundational — ramework — or understanding this complex relationship by showing how contracts shape and are ­shaped by trade secret doctrine. Unlike patents, which are publicly registered, trade secrets gain ­legal recognition in part through contractual signals that demarcate con-


idential in — ormation. Well-­dra — ted contracts identi — y speci — ic secrets, establish clear duties — or recipients, and create an evidentiary trail that proves reasonable protection e —


orts. Courts increasingly rely on such contracts as objective proo — that in — ormation was treated as secret and thus satis — ies the “reasonable e —


orts” requirement ­under the UTSA. Recent empirical work by Camilla Hrdy and Christopher Seaman highlights a trou- bling trend: many nondisclosure agreements (NDAs) — unction as de — acto noncom- petes by prohibiting the use or disclosure o — in — ormation — ar beyond what is legally

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 213 1/12/26 2:51 PM 214 7 • Sustaining and Adapting Trade Secret Protection

                            protectable as a trade secret. Their analy­sis o ---

ederal cases reveals that a substantial majority o — NDAs contain no temporal or geographic limits, cover “any in — ormation disclosed” rather than genuine secrets, and impose injunctive relie — and attorneys’


ees — or breaches. Such overbroad contracts risk invalidation ­under emerging l­egal standards, and the Federal Trade Commission’s 2023 rule banning noncompetes explic­itly warns that NDAs may be scrutinized as unlaw — ul restraints on trade i — they e —


ectively prevent workers — rom seeking employment.

                                                            Private Agreements

                                                  Tools  --- or Trade Secret Protection or Unlaw --- ul
                                                               Restraints on Trade?
                                    Contracts play a pivotal role in trade secret protection, but what exactly
                                 do they do? Deepa Varadarajan argues that con --- identiality agreements serve
                                 a critical notice  --- unction: they de --- ine what counts as a trade secret, establish
                                 expectations o ---  con --- identiality, and provide objective evidence that the in --- or-
                                 mation was treated as valuable and secret. On this view, contracts help satis --- y
                                 the “reasonable e ---

orts” requirement ­under the Uni — orm Trade Secrets Act not by replacing the statute but rather by rein — orcing it. But what happens when contracts go too — ar? Camilla Hrdy and Chris- topher Seaman’s empirical analy­sis o — over 100 — ederal NDA cases reveals widespread overreach. Many agreements prohibit the use or disclosure o — any in — ormation, lack temporal or geographic limits, and automatically impose injunctive relie — —­ even when the in — ormation would not quali — y as a trade secret ­under law. Such terms, they argue, risk trans — orming NDAs into de — acto noncompetes that chill employee mobility and undermine the legitimacy o —

                                 trade secret en --- orcement.
                                    TSPP implication: The contract–­trade secret inter --- ace must be tight but not
                                 taut. Strong NDAs support trade secret claims, but overbroad ones invite ­legal
                                 challenges, regulatory scrutiny, and employee ­resistance. Prac­ti­tion­ers should
                                 ensure that agreements track real secrets, use de --- ensible language, and evolve
                                 with doctrine and en --- orcement trends.



                              ­These contractual tensions are especially acute when secrecy claims intersect with
                            employee mobility —­ a  --- lashpoint  --- or courts, policymakers, and prac­ti­tion­ers alike.

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 214 1/12/26 2:51 PM 7 • Sustaining and Adapting Trade Secret Protection 215

                                                     Secrecy and Mobility

                                           Where Do a Com­pany’s Rights End and
                                               an Employee’s Rights Begin?
                        Trade secret law protects  --- irms. But what about the ­people who power them?
                     The tension between secrecy and l­abor mobility lies at the heart o ---  modern
                     innovation policy. Camilla Hrdy argues that secrecy creates value by enabling

irms to commercialize ideas without disclosure, but it can also chill mobility and sti — le knowledge spillovers that drive innovation ecosystems. Deepa Varadarajan similarly warns that overreliance on secrecy, especially when coupled with broad NDAs and noncompetes, can morph into a tool — or employee lock-in. Courts have long strug­gled with the inevitable disclosure doctrine, where employers seek to block — ormer employees — rom working — or competitors on the theory that t­hey’ll “inevitably” use trade secrets. While some courts accept this logic, ­others see it as an end-­run around employment


reedom. For TSPP design, the message is clear: trade secret en — orcement should not become a proxy — or unlaw — ul ­labor restrictions. NDAs should be narrowly tai- lored to ­actual secrets, not to generalized experience, and should avoid language that implies permanent in — ormation owner­ship. Man­ag­ers must be trained to distinguish between law — ul protection and anti-­competitive constraints. The best de — ense is o — ten clarity —­  — irms must de — ine what is protectable, document what is disclosed, and re­spect what employees legitimately carry with them: their skills, memories, and know-­how.

                   In practice, ­organizations must care --- ully navigate the contract–­trade secret inter-

ace to ensure their protection strategies are both legally de — ensible and operationally e —


ective. This means dra — ting contracts that are precise in their de — initions, tailored to genuine trade secrets, and regularly reviewed to avoid overreach. It also means educating employees about their obligations and the limits o — con — identiality, and maintaining clear documentation o — all protection e —


orts. The goal is to rein — orce statutory trade secret bound­aries rather than attempt to expand them beyond what the law ­will support. Consider, — or example, a so — tware com­pany protecting its AI training method- ologies. Rather than relying on blanket NDAs, it implements a tiered approach to con — identiality agreements, with di — ­ — er­ent levels o — restriction based on the sensitivity and business value o — the in — ormation. Public algorithms might be unrestricted, pro- prietary datasets subject to ­limited use prohibitions, and core architecture protected

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 215 1/12/26 2:51 PM 216 7 • Sustaining and Adapting Trade Secret Protection

                            by permanent nondisclosure provisions. Dynamic annexes listing current secrets
                            and sunset provisions  --- or expiring restrictions help ensure that contracts remain
                            aligned with both ­legal requirements and business needs. This approach exempli --- ies
                            Varadarajan’s ideal o ---  contracts that “rein --- orce rather than replace” statutory trade
                            secret bound­aries.
                               Key TSPP contract practices include dra --- ting contracts with precise de --- initions o ---

                            trade secrets and clear duties  --- or recipients, regularly auditing and updating con --- iden-
                            tiality agreements to avoid overreach, educating employees on their obligations and
                            the limits o ---  con --- identiality, and maintaining documentation o ---  all protection e ---

orts to satis — y evidentiary requirements.

                                             7.4. ­Organizational Culture and
                                                Continuous Improvement
                              Trade secret protection cannot be sustained by ­legal doctrine and contracts alone.
                            The most robust Trade Secret Protection Plans (TSPPs) are t­hose that are embed-
                            ded within the ­organizational culture, supported by leadership, and continuously
                            improved through  --- eedback and adaptation. Recent scholarship in management sci-
                            ence and ­organizational be­hav­ior underscores the importance o ---  culture, routines,
                            and incentives in making secrecy a living ­process rather than a static set o ---  rules.
                                Leadership plays a pivotal role in setting the tone  --- or trade secret protection.
                            When executives and man­ag­ers consistently signal the importance o ---  con --- idential-
                            ity —­ through their words, actions, and resource allocation —­ employees are more
                            likely to internalize the value o ---  secrecy and adhere to established protocols. This
                            cultural rein --- orcement is o --- ten more e ---

ective than — ormal policies alone, as it cre- ates a shared understanding and collective responsibility — or protecting sensitive in — ormation. Continuous improvement is another hallmark o — e —


ective TSPPs. ­Organizations must create — eedback loops that allow employees to report concerns, suggest improve- ments, and learn — rom incidents or near-­misses. Regular audits, training sessions, and “a — ter-­action” reviews o — breaches or vulnerabilities help ensure that protection strate- gies remain current and responsive to changing circumstances. Ionela Andreicovici, Sara Bormann, and Katharina Hombach’s research demonstrates that strong trade secret en — orcement can actually — acilitate internal in — ormation sharing by reducing the perceived risk o — leaks, thus leading to greater integration and better decision-­ making within the — irm. This — inding challenges the assumption that secrecy neces- sarily leads to ­organizational silos; instead, it suggests that a well-­designed TSPP can balance con — identiality with the need — or collaboration and innovation.

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 216 1/12/26 2:51 PM 7 • Sustaining and Adapting Trade Secret Protection 217

                                      ­Organizational Culture o ---  Secrecy

                                              ­Legal Shield or Dynamic Capability?
                        What makes a Trade Secret Protection Plan (TSPP) stick? Many companies
                     treat secrecy as a compliance ­matter —­ write the NDA, limit access, check the
                     box. But ­organizational scholars argue that lasting protection comes not  --- rom
                     static controls but  --- rom secrecy-­as-­capability: a routinized, adaptive practice
                     woven into the  --- abric o ---  how  --- irms operate.
                        Oleksandra Ozcan and colleagues argue that trade secret protection should
                     be understood as a  --- orm o ---  dynamic capability —­ a  --- irm’s ability to sense risks,
                     seize opportunities, and recon --- igure internal pro­cesses in response to change.
                     On this view, secrecy is not a static shield; it is an ­organizational routine that
                     evolves through training, re --- lection, and learning  --- rom incidents.
                        A related study by Ionela Andreicovici, Sara Bormann, and Katharina Hom-
                     bach challenges the assumption that secrecy sti --- les collaboration. Their empiri-
                     cal research shows that robust trade secret en --- orcement can enhance internal
                     in --- ormation sharing by reducing  --- ear o ---  leaks, thereby enabling greater integra-
                     tion across departments. Instead o ---

ostering silos, a well-­designed TSPP builds trust, clari — ies expectations, and supports knowledge — low. For TSPP implementation, the implication is clear: Secrecy must be lived, not just documented. This means investing in onboarding, recurring training, incident debrie — s, and leadership modeling. It also means designing systems that support transparency within the — irm while keeping sensitive material insulated — rom external threats. In short: to protect secrets, build habits.

                  Yet strong culture alone is not enough. As ­organizations grow, routines that once
                ensured secrecy can erode, thus raising the stakes  --- or scale-­conscious design.


                                                            Secrecy at Scale

                                         Can Trade Secret Protection Plans Survive
                                                 Organizational Growth?
                        Building a TSPP is hard. Scaling it is harder. As  --- irms grow —­ especially
                     through hiring, acquisitions, remote work, or international expansion —­ sys-
                     tems that once worked can quietly  --- ail. Trade secrets may be documented but
                     not updated, or disclosed to vendors without proper controls, or  --- orgotten by
                     new man­ag­ers  --- ocused on speed over structure.

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 217 1/12/26 2:51 PM 218 7 • Sustaining and Adapting Trade Secret Protection

                                    ­Organizational research shows that rapid growth increases the likelihood o ---

                                 “protection gaps”: inconsistencies in training, contract en --- orcement, or access
                                 controls that undermine ­legal protection. Even companies with strong startup
                                 protocols o --- ten see ­these systems degrade ­under the pressure o ---  scaling, espe-
                                 cially when ­legal teams lag ­behind hiring or product expansion.
                                    Andreicovici, Bormann, and Hombach’s empirical study reveals that secrecy
                                 en --- orcement can actually  --- oster internal in --- ormation sharing —­ but only when

irms proactively manage integration. This supports a key insight — rom Ozcan et al.: secrecy routines must evolve alongside the — irm’s dynamic capabilities. What worked with 20 engineers and 1 — ounder-­lawyer may collapse at 200 employees across 3 countries. The lesson — or TSPPs is ­simple but vital: growth is a vulnerability. Trade secret protection must scale with systems, not individuals. That means updat- ing contracts during onboarding surges, re — reshing access protocols a­ — ter reorgs, and auditing cultural gaps between legacy teams and new hires. The best secrecy plans are modular, adaptable, and built — or institutional —­ not just


ounder-­level —­  memory.

                               In short, leaders must model con --- identiality, ­organizations must invest in continual

eedback and training, and protection plans must balance secrecy with collabora- tion. When ­these princi­ples are embedded into ­organizational routines, trade secret protection becomes more than just a ­legal obligation. It becomes a durable source o —

                            competitive advantage.



                                        7.5. Technology, Globalization, and
                                               Emerging Challenges
                               The landscape o ---  trade secret protection is being reshaped by rapid advances in
                            technology and the increasing globalization o ---  business. ­These developments intro-
                            duce new risks, complicate en --- orcement, and require ­organizations to continuously
                            adapt their Trade Secret Protection Plans (TSPPs) to remain e ---

ective. Camilla Hrdy’s recent work on generative AI illustrates how digital trans — ormation is creating novel challenges — or trade secret law and practice. Companies are now grappling with the risks o — inadvertent disclosure through AI tools, the need to protect AI-­generated outputs that may not quali — y — or other — orms o — intellectual property protection, and the use o — restrictive contracts to sa — eguard technology even when traditional l­egal protections — all short. This evolving environment demands that TSPPs include robust technical controls, such as encryption, access logs, and closed-­source architectures,

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 218 1/12/26 2:51 PM 7 • Sustaining and Adapting Trade Secret Protection 219

                alongside clear contractual terms that de --- ine permissible and impermissible uses o ---

                sensitive in --- ormation.



                                     Secrecy with Arti --- icial Intelligence

                               Can Firms Leverage Innovative Technologies Without
                                     Giving Up Intellectual Property Rights?
                         Can you keep a secret —­ when your algorithm cannot? As generative AI
                     trans --- orms business operations, it also exposes  --- ault lines in trade secret doc-
                     trine. Camilla Hrdy warns that AI systems both rely on and produce trade
                     secrets, but their opacity raises hard questions: How do we protect the data that
                     trains the model, the model itsel --- , and its outputs, especially when disclosure
                     is integral to their use?
                        Hrdy identi --- ies a doctrinal gap: Trade secret law demands reasonable
                     e ---

orts to maintain secrecy, yet AI tools are o — ten integrated into cloud-­based work — lows or accessed through third-­party APIs, especially when tools are embedded in external plat — orms or accessed via cloud vendors outside the


irm’s control. This makes traditional con — identiality ­measures — ragile, i — not impossible. When models “leak” outputs or training data, courts may con- clude that no secret was e —


ectively kept. In response, companies increasingly turn to restrictive licenses or end-­user agreements to compensate — or l­egal gaps —­ which raises concerns that private governance may override demo­ cratic accountability. This doctrinal uncertainty echoes broader policy debates. Mark Lemley cau- tions that courts should be skeptical o — “secrecy through obscurity” —­ particu- larly when AI systems produce outputs with signi — icant social consequences, such as hiring recommendations or predictive policing. In such contexts, trans- parency and accountability may outweigh the interests o — secrecy. For TSPP designers, the implication is clear: secrecy strategies must now account — or technical realities, l­egal ambiguities, and growing public demand


or explainability. Rather than treating AI-­generated assets as wholly private and controllable, — irms should clari — y what in — ormation is genuinely protect- able, adopt sa — eguards that match deployment environments, and be pre- pared to justi — y their secrecy claims when systems a —


ect rights, markets, or reputations.

                   Globalization  --- urther complicates the picture. As  --- irms expand across borders,
                they must navigate a patchwork o ---  l­egal regimes with di ---

ering standards — or trade secret protection, en — orcement mechanisms, and cultural attitudes ­toward secrecy.

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 219 1/12/26 2:51 PM 220 7 • Sustaining and Adapting Trade Secret Protection

                            Marta Arroyabe and colleagues’ empirical research on mergers and acquisitions
                            shows that while strong trade secret protection can make companies more attractive
                            to domestic buyers, it may also create in --- ormation asymmetries that deter  --- oreign
                            acquirers, who may pre --- er minority investments or additional sa --- eguards to mitigate
                            risk. ­These  --- indings highlight the importance o ---  tailoring TSPPs to the speci --- ic ­legal
                            and business environments in which a  --- irm operates, and o ---  ensuring that protec-
                            tion strategies are communicated clearly to partners, suppliers, and employees across
                            jurisdictions.



                                                            Globalization and Risk

                                       Can International Firms Protect Trade Secrets Across ­Legal
                                                               Borders?
                                      In a global economy, trade secrets do not stay put. They cross borders with
                                 employees, contractors, suppliers, and servers —­ o --- ten  --- aster than ­legal protec-
                                 tions can  --- ollow. For companies operating internationally, the biggest challenge
                                 is ­legal asymmetry: what counts as a protectable secret and how it is en --- orced
                                 varies dramatically across jurisdictions.
                                    Empirical research by Marta Arroyabe and colleagues illustrates this chal-
                                 lenge in the M&A context. Their  --- indings show that stronger trade secret
                                 regimes can both attract and deter investment: domestic buyers value secrecy
                                 en --- orcement, but  --- oreign acquirers may avoid deals i ---  ­legal uncertainty or dis-
                                 closure risks create asymmetries in bargaining power or integration. Secrecy,
                                 in other words, a ---

ects deal structure. Comparative scholars, like Tanya Aplin and Jorge Contreras, also high- light diverging approaches. The US model, especially post-­DTSA, emphasizes aggressive en — orcement and broad injunctions. In contrast, EU regimes o — ten weigh secrecy against transparency, competition, and l­abor rights. China’s recent re — orms increase penalties — or the — t but still lack procedural parity, which raises due ­process concerns — or — oreign — irms. Implication — or TSPPs: Global — irms must design protection plans that travel well. This means mapping l­egal environments in ­every country o — operation, tailoring controls and contracts to local norms and en — orceability, and central- izing en — orcement readiness. A strong home jurisdiction strategy can serve as a ­legal anchor, even when misappropriation occurs abroad.

                               Internal in --- ormation integration is another area where technology and globaliza-
                            tion intersect. Andreicovici, Bormann, and Hombach’s work demonstrates that robust
                            trade secret en --- orcement can actually enhance internal collaboration by reducing

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 220 1/12/26 2:51 PM 7 • Sustaining and Adapting Trade Secret Protection 221

                the perceived risk o ---  leaks, thus allowing employees to share knowledge more  --- reely
                within the ­organization. Modern IT systems, such as enterprise management plat-

orms with secure access controls, enable — irms to balance the need — or secrecy with the bene — its o — internal transparency and innovation. This approach is particularly valuable — or multinational companies, where in — ormation must — low e —


iciently across geo­graph­i­cally dispersed teams while remaining protected — rom external threats. In summary, the combined — orces o — digital trans — ormation and l­egal asymmetry demand that TSPPs be not only secure but also portable and explainable. They must be able to withstand both technical disruption and global ­legal complexity. By design- ing protection plans that anticipate new risks, accommodate diverse l­egal environ- ments, and leverage technological solutions, — irms can ensure that their most valuable assets remain protected in an increasingly complex and interconnected world.

                                 7.6. Synthesis: The Living TSPP
                    The preceding sections have demonstrated that sustaining a Trade Secret Protec-
                tion Plan (TSPP) is not a ­matter o ---  dra --- ting a single document or implementing a set
                o ---  static controls. Instead, it is a dynamic, living ­process that must evolve with the
                ­organization, its environment, and the broader ­legal and technological landscape. This
                 synthesis weaves together the doctrinal, economic, ­organizational, and operational
                 insights that make a TSPP not just legally de --- ensible but also strategically essential.
                    At the core o ---  trade secret law is the requirement  --- or “reasonable e ---

orts” to main- tain secrecy —­ a standard that is inherently dynamic and context-­dependent. As Sha- ron Sandeen and ­others have shown, this requirement re — lects a deliberate policy choice: trade secrets are not protected in the abstract but rather only when the ­owner demonstrates ongoing vigilance and adaptation. The law does not reward mere intent; it requires vis­i­ble, consistent action. Yet what counts as “reasonable” is — ar — rom set- tled. See Box.

                                      The “Reasonable E ---

orts” Doctrine

                                          Flexible Standard or Unpredictable Risk?
                         What counts as “reasonable e ---

orts” to protect trade secrets? The statute is — amously vague, leaving courts signi — icant discretion to decide ­whether a com­pany’s sa — eguards are su —


icient to trigger l­egal protection. Traditionally, courts looked — or evidence o — access controls, NDAs, and training programs. But recent cases show a growing divergence: some courts apply the standard


lexibly, adapting to modern business realities, while ­others demand rigorous


ormalities, creating uncertainty — or — irms.

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 221 1/12/26 2:51 PM 222 7 • Sustaining and Adapting Trade Secret Protection

                                    Sharon Sandeen argues that this ambiguity is not a bug but a  --- eature. The
                                 “reasonable e ---

orts” standard is context-­sensitive by design, meant to balance


lexibility — or innovators with — airness to third parties. Yet that very — lexibility creates risk. As Camilla Hrdy notes, what quali — ies as “reasonable” may shi — t as norms evolve or high-­pro — ile breaches raise judicial expectations. Courts have become more skeptical o — boilerplate policies and more attentive to implementa- tion: a pristine NDA is no substitute — or sloppy onboarding or ignored training. Meanwhile, AI-­driven compliance systems and data-­loss prevention tools are reshaping what courts might expect. I — technical sa — eguards are widely available but not used, is that still “reasonable”? As expectations rise, what was de — ensible yesterday may be de — icient tomorrow. Implication — or TSPP design: The “reasonable e —


orts” threshold is a moving target. Protection plans must be tailored, documented, and —­ above all —­ lived. Judges are increasingly asking not just what rules ­were written but also how they ­were applied. To — uture-­proo — your secrets, treat compliance as an evolving conversation, not a checklist.

                               Eco­nom­ically, trade secret protection is justi --- ied as a means o ---  encouraging inno-
                            vation by allowing companies to capture the value o ---  their investments in knowledge
                            and know-­how. Landes and Posner’s analy­sis underscores that trade secrecy is a
                            “second-­best” mechanism  --- or innovation, one that balances the need  --- or disclosure
                            and competition with the value o ---  secrecy. Further supporting this view is recent
                            empirical work by Ivan Png demonstrating that stronger trade secret protection
                            leads to increased R&D investment in sectors where secrecy is most valuable. This

eedback loop —­ where robust protection encourages innovation, and innovation in turn increases the value o — protection —­ rein — orces the importance o — a living, evolv- ing TSPP. From an ­organizational perspective, the e —


ectiveness o — a TSPP depends on its integration into the daily rhythms and culture o — the com­pany. Oleksandra Ozcan and colleagues emphasize that trade secret strategies must be treated as part o — a — irm’s dynamic capabilities ­because they require continuous sensing o — threats, seizing o —

                            opportunities, and recon --- iguring o ---  resources. Ionela Andreicovici, Sara Bormann,
                            and Katharina Hombach’s research adds that strong trade secret en --- orcement can
                            actually  --- acilitate internal in --- ormation sharing by reducing the perceived risk o ---  leaks,
                            which can lead to greater integration and better decision-­making within the  --- irm. This
                            challenges the assumption that secrecy necessarily leads to silos; instead, it suggests
                            that a well-­designed TSPP can balance con --- identiality with the need  --- or collaboration
                            and innovation.
                              The contract–­trade secret inter --- ace  --- urther illustrates the importance o ---  ongoing
                            adaptation. Deepa Varadarajan’s work highlights how contracts serve both evidentiary

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 222 1/12/26 2:51 PM 7 • Sustaining and Adapting Trade Secret Protection 223

                and substantive roles in trade secret law and create a web o ---  obligations that courts
                scrutinize when assessing ­whether secrecy was maintained. Camilla Hrdy and Chris-
                topher Seaman’s empirical analy­sis warns against the overuse o ---  nondisclosure agree-
                ments that  --- unction as de  --- acto noncompetes, underscoring the need  --- or contracts
                that are precise, tailored, and regularly reviewed to avoid overreach.
                   Technological change and globalization add  --- urther layers o ---  complexity. Camilla
                Hrdy’s analy­sis o ---  generative AI and digital trans --- ormation shows how new technolo-
                gies introduce novel risks and require updated protection strategies. Marta Arroyabe
                and colleagues’ research on mergers and acquisitions demonstrates that strong trade
                secret protection can make companies more attractive to domestic buyers but also
                may create in --- ormation asymmetries that deter  --- oreign acquirers, highlighting the
                need  --- or tailored, context-­sensitive protection strategies.
                   In practice, ­these insights mean that a TSPP must be both robust and  --- lexible. It
                must be grounded in a clear understanding o ---  what in --- ormation is valuable and why
                and be implemented through a combination o ---  technical, ­legal, and cultural controls.
                It must be regularly reviewed and updated to re --- lect changes in the business, the ­legal
                environment, and the threat landscape. And it must be embedded in the culture o ---

                the ­organization so that protection is not just a compliance exercise but a shared
                responsibility.
                   Across the lit­er­a­ture and doctrine, a set o ---  recurring tensions emerges: the need
                to balance secrecy and disclosure, to align statutory baselines with contractual sa --- e-
                guards, to promote innovation without chilling competition, and to protect employer
                interests without restricting employee mobility. ­These tensions are not  --- laws in the
                system —­ they are the design. They re --- lect the policy tradeo ---

s and institutional judg- ments that give trade secret law its shape. They also re — lect the real-­world complexity


aced by ­organizations that operate across borders, integrate new technologies, and rely on intangible knowledge as a core asset. Ultimately, a living TSPP is not a checklist or a — ormality. It is a strategic response to the law’s demand — or vis­i­ble, continuous e —


ort. It is a system that evolves with the ­organization, learns — rom experience, and is sustained by the ­people who live it. By grounding your protection plan in ­these ­legal, economic, ­organizational, and ethical princi­ples, you move beyond compliance and into stewardship, where you can build a trade secret strategy that is not only de — ensible but also durable.

                                     Conclusion: The Partner-­Level Mindset
                   As you reach the end o ---  this chapter, re --- lect on the path you have taken —­  --- rom
                the concrete work o ---  building a Trade Secret Protection Plan to the exploration o ---

                deeper  --- oundations o ---  law, economics, ­organizational design, and strategic  --- oresight.
                The shi --- t  --- rom practice to theory is not just academic. It marks the di ---

erence between executing instructions and leading with purpose.

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 223 1/12/26 2:51 PM 224 7 • Sustaining and Adapting Trade Secret Protection

                               A living TSPP is not a static document or compliance checklist. It is a dynamic
                            system that evolves with your business, anticipates new risks, and withstands l­egal
                            scrutiny. Its strength lies in continuous attention and adaptation. It is grounded in the
                            law’s demand  --- or “reasonable e ---

orts,” ­shaped by policy choices and incentive struc- tures, and sustained by culture, governance, and technical systems. This chapter has invited you to step into the role o — architect —­ where you are not just wiring the cir­cuits but designing the structure. You now understand why the


oundation ­matters, what pressures it must bear, and how its integrity a —


ects every­ thing above it. With this knowledge, you are prepared to engage in partner-­level conversations that shape not simply policies, compliance, and protection but also strategy, leadership, and stewardship.

                                                                 Re --- erences
                               Sharon K. Sandeen, The Evolution o ---  Trade Secret Law and Why Courts Commit
                            Error When They Do Not Follow the Uni --- orm Trade Secrets Act, 33 Hamline L. Rev.
                            493 (2010).
                               Guido Calabresi & A. Douglas Melamed, Property Rules, Liability Rules, and
                            Inalienability: One View o ---  the Cathedral, 85 Harv. L. Rev. 1089 (1972).
                                Oleksandra Ozcan, David Pickernell, & Paul Trott, A Trade Secrets Framework and
                            Strategic Approaches, IEEE Transactions on Eng’g Mgmt. (2023), https://­doi​.­org​
                            /­10​.­1109​/­TEM​.­2023​.3285292.
                               Ionela Andreicovici, Sara Bormann, & Katharina Hombach, Trade Secret Protec-
                            tion and the Integration o ---  In --- ormation Within Firms, TRR 266 Working Paper No. 78
                            (2023), https://­dx​.­doi​.­org​/­10​.­2139​/­ssrn​.3881395.
                              Tun-­Jen Chiang, The Economic Structure o ---  Trade Secret Law, George Mason L. &
                            Econ. Res. Paper No. 25-03 (2024), https://­dx​.­doi​.­org​/­10​.­2139​/­ssrn​.4942344.
                              William M. Landes & Richard A. Posner, The Economic Structure o ---  Intel-
                            lectual Property Law (Harv. Univ. Press 2003).
                              David S. Levine & Joshua D. Sarno ---

, Compelling Trade Secret Sharing, 74 Hast- ings L. J. 987 (2023). I. P. L. Png, Secrecy and Patents: Theory and Evidence — rom the Uni — orm Trade Secrets Act, 2(3) Strategy Science 176–93, https://­doi​.­org​/­10​.­1287​/­stsc​.­2017​.0035. Mark A. Lemley, The Surprising Virtues o — Treating Trade Secrets as IP Rights, 61 Stan. L. Rev. 311 (2010). Deepa Varadarajan, The Trade Secret–­Contract Inter — ace, 103 Iowa L. Rev. 1543 (2018). Camilla A. Hrdy & Christopher B. Seaman, Beyond Trade Secrecy: Con — identiality Agreements That Act Like Noncompetes, 133 Yale L.J. 669 (2024).

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 224 1/12/26 2:51 PM 7 • Sustaining and Adapting Trade Secret Protection 225

                    Camilla A. Hrdy, The Value in Secrecy, 91 Fordham L. Rev. 129 (2022).
                   Charles Tait Graves, Intentionality in Trade Secret Law, 39 Berkeley Tech. L. J. 721
                (2024), https://­doi​.­org​/­10​.­15779​/Z38000018N.
                  Camilla A. Hrdy, Keeping ChatGPT a Trade Secret While Selling It Too, 40 Berke-
                ley Tech. L.J. 75 (2025), https://­doi​.­org​/­10​.­15779​/Z38FT8DM21.
                    Christopher Bucca --- usco, Jonathan S. Masur, & Deepa Varadarajan, Trade Secrecy’s
                In --- ormation Paradox, 100 Notre Dame L. Rev ___ ( --- orthcoming 2025), https://­dx​
                .­doi​.­org​/­10​.­2139​/­ssrn​.4909857.
                   Camilla A. Hrdy, Christopher Bucca --- usco, Jonathan S. Masur, & Deepa Varada-
                rajan, Does Trade Secrecy Have an “In --- ormation Paradox”?, Rutgers Inst.  --- or In --- o.
                Pol’y & L. (2025), https://­perma​.­cc​/­PRN9​-2ENV.
                   Marta F. Arroyabe, Christopher Grimpe, & Katrin Hussinger, Sa --- eguarding Secrets,
                Shaping Acquisitions: Trade Secret Protection and the Role o ---  Distance Between Acquirer
                and Target, ZEW —­ Ctr.  --- or ­European Econ. Res. Discussion Paper No. 25-007 (2025),
                https://­dx​.­doi​.­org​/­10​.­2139​/­ssrn​.5116418.
                  Tanya Aplin, The Inter --- ace Between Trade Secrets and Freedom o ---  Expression:
                A Comparative Perspective, in The Law o ---  Trade Secrets (Rochelle C. Drey --- uss
                & Katherine J. Strandburg eds., Edward Elgar Publ’g 2d ed. 2020).
                   Jorge L. Contreras, Trade Secret, Concurrences Global Dictionary o ---  Competi-
                tion Law (2023).

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 225 1/12/26 2:51 PM 6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 226 1/12/26 2:51 PM Epilogue

                   Trade secret law is easy to underestimate. It lacks the dramatic disclosures o ---  patent
                prosecution, the public visibility o ---  trademarks, or the rhetorical  --- orce o ---  copyright
                in --- ringement. It rarely commands headlines. And yet, in practice, it governs some o ---

                the most critical and contested knowledge in the modern economy.
                   What makes trade secret law power­ --- ul is also what makes it quiet. It protects not
                what is made public but rather what is kept back. It rewards diligence over disclosure,
                continuity over  --- ormality. And it re --- lects a core insight about innovation in real li --- e:
                that many o ---  the most valuable ideas are not made in the lab or  --- iled in the PTO.
                Rather, they are developed in --- ormally, iterated privately, and sa --- eguarded through
                shared e ---

ort and institutional design. This book aims to bridge two domains: the ­legal doctrine that de — ines trade secret misappropriation and the ­organizational realities that shape how secrecy is main- tained. The result is a body o — law that demands both theoretical precision and practi- cal engagement. It is doctrinally rich, culturally contingent, and deeply embedded in the structures o — trust, discretion, and control that govern economic li — e. Students o — trade secret law must learn to think in multiple registers. They must read cases with care but also ask how ­those disputes arose: what broke down inside the com­pany, what assumptions ­were unexamined, what controls — ailed, and what stories convinced the court. They must learn to advise clients not just on litigation risk but also on in — ormation architecture. They must see law as a living constraint —­ and a


ramework — or proactive design. The ­ — uture o — trade secret law ­will not be determined solely in courtrooms. It ­will be ­shaped in boardrooms, design studios, codebases, supply chains, and Zoom calls. It ­will depend on how companies manage internal knowledge, how they govern external collaborations, and how they adapt to emerging threats that l­egal doctrine may not yet — ully anticipate. What this area o — law demands, more than anything, is judgment. Judgment about what is worth protecting. Judgment about how to protect it. And judgment about what trade secret law is truly trying to preserve —­ not secrecy — or its own sake but rather the integrity o — innovation in a world where trust is scarce and knowledge moves — ast. That is the work. And that is the invitation.

                                                            227

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 227 1/12/26 2:51 PM 6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 228 1/12/26 2:51 PM Appendix A [New Hampshire] Uni — orm Trade Secrets Act

                                                            1. De --- initions
                    As used in this chapter, ­unless the context requires other­wise:
                   I. “Improper means” includes the --- t, bribery, misrepre­sen­ta­tion, breach or induce-
                ment o ---  a breach o ---  a duty to maintain secrecy, or espionage through electronic or
                other means.
                    II. “Misappropriation” means:
                        (a) Acquisition o ---  a trade secret o ---  another by a person who knows or has reason
                            to know that the trade secret was acquired by improper means; or
                        (b) Disclosure or use o ---  a trade secret o ---  another without express or implied
                            consent by a person who:
                              (1) Used improper means to acquire knowledge o ---  the trade secret; or
                              (2) At the time o ---  disclosure or use, knew or had reason to know that his
                                  knowledge o ---  the trade secret was derived  --- rom or through a person who
                                  had utilized improper means to acquire it; or acquired ­under circum-
                                  stances giving rise to a duty to maintain its secrecy or limit its use; or
                                  derived  --- rom or through a person who owed a duty to the person seek-
                                  ing relie ---  to maintain its secrecy or limit its use; or
                              (3) Be --- ore a material change o ---  his position, knew or had reason to know
                                  that it was a trade secret and that knowledge o ---  it had been acquired by
                                  accident or ­mistake.
                   III. “Person” means a natu­ral person, corporation, business trust, estate, trust,
                partnership, association, joint venture, government, governmental subdivision or
                agency, or any other ­legal or commercial entity.
                  IV. “Trade secret” means in --- ormation, including a  --- ormula, pattern, compilation,
                program, device, method, technique, or ­process, that:
                        (a) Derives i­ndependent economic value, ­actual or potential,  --- rom not being
                            generally known to, and not being readily ascertainable by proper means


                                                                 229

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 229 1/12/26 2:51 PM 230 Appendix A

                                          by, other persons who can obtain economic value  --- rom its disclosure or use;
                                          and
                                    (b) Is the subject o ---  e ---

orts that are reasonable ­under the circumstances to main- tain its secrecy.

                                                            2. Injunctive Relie ---

                                 I. Actual or threatened misappropriation may be enjoined. Upon application to
                            the court, an injunction ­shall be terminated when the trade secret has ceased to exist,
                            but the injunction may be continued  --- or an additional reasonable period o ---  time in
                            order to eliminate commercial advantage that other­wise would be derived  --- rom the
                            misappropriation.
                                II. In exceptional circumstances, an injunction may condition ­ --- uture use upon
                            payment o ---  a reasonable royalty  --- or no longer than the period o ---  time  --- or which use
                            could have been prohibited. Exceptional circumstances include, but are not ­limited to,
                            a material and prejudicial change o ---  position prior to acquiring knowledge or reason
                            to know o ---  misappropriation that renders a prohibitive injunction inequitable.
                              III. In appropriate circumstances, a ---

irmative acts to protect a trade secret may be compelled by court order.

                                                                3. Damages
                                 I. Except to the extent that a material and prejudicial change o ---  position prior
                            to acquiring knowledge or reason to know o ---  misappropriation renders a monetary
                            recovery inequitable, a complainant is entitled to recover damages  --- or misappropria-
                            tion. Damages can include both the ­actual loss caused by misappropriation and the
                            unjust enrichment caused by misappropriation that is not taken into account in com-
                            puting ­actual loss. In lieu o ---  damages ­measured by any other methods, the damages
                            caused by misappropriation may be ­measured by imposition o ---  liability  --- or a reason-
                            able royalty  --- or a misappropriator’s unauthorized disclosure or use o ---  a trade secret.
                                II. I ---  will --- ul and malicious misappropriation exists, the court may award exem-
                            plary damages in an amount not exceeding twice any award made ­under paragraph I.


                                                            4. Attorneys’ Fees
                                The court may award reasonable attorneys’  --- ees to the prevailing party when:
                                   I. A claim o ---  misappropriation is made in bad  --- aith;
                                  II. A motion to terminate an injunction is made or resisted in bad  --- aith; or
                                III. Will --- ul and malicious misappropriation exists.

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 230 1/12/26 2:51 PM Appendix A 231

                                             5. Preservation o ---  Secrecy
                   In an action ­under this chapter, a court ­shall preserve the secrecy o ---  an alleged
                trade secret by reasonable means, which may include granting protective ­orders in
                connection with discovery proceedings, holding in-­camera hearings, sealing the rec­
                ords o ---  the action, and ordering any person involved in the litigation not to disclose
                an alleged trade secret without prior court approval.


                                               6. Statute o ---  Limitations
                   An action  --- or misappropriation ­shall be brought within 3 years ­a --- ter the misap-
                propriation is discovered or by the exercise o ---  reasonable diligence should have been
                discovered. For the purposes o ---  this section, a continuing misappropriation consti-
                tutes a single claim.


                                                 7. E ---

ect on Other Law I. Except as provided in paragraph II, this chapter displaces con — licting tort, res- titutionary, and other law o — this state providing civil remedies — or misappropriation o — a trade secret. II. This chapter ­shall not a —


ect: (a) Contractual remedies, ­whether or not based upon misappropriation o — a trade secret; (b) Other civil remedies that are not based upon misappropriation o — a trade secret; or (c) Criminal remedies, ­whether or not based upon misappropriation o — a trade secret.

                                         8. Uni --- ormity o ---  Application
                                              and Construction
                   This chapter ­shall be applied and construed to e ---

ectuate its general purpose to make uni — orm the law with re­spect to the subject o — this chapter among states enact- ing it.

                                                            9. Short Title
                    This chapter may be cited as the New Hampshire [Uni --- orm] Trade Secrets Act.

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 231 1/12/26 2:51 PM 6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 232 1/12/26 2:51 PM Appendix B De — end Trade Secrets Act (DTSA, 18 USC § 1836 et seq.)

                  (a) The Attorney General may, in a civil action, obtain appropriate injunctive relie ---

                against any violation o ---  this chapter 18 USCS §§ 1831 et seq.
                    (b) Private civil actions.
                          (1) In general. An ­owner o ---  a trade secret that is misappropriated may bring a
                              civil action ­under this subsection i ---  the trade secret is related to a product
                              or ­service used in, or intended  --- or use in, interstate or  --- oreign commerce.
                          (2) Civil seizure.
                               (A) In general.
                                      (i) Application. Based on an a ---

idavit or veri — ied complaint satis — y- ing the requirements o — this paragraph, the court may, upon ex parte application but only in extraordinary circumstances, issue an order providing — or the seizure o — property necessary to pre- vent the propagation or dissemination o — the trade secret that is the subject o — the action. (ii) Requirements — or issuing order. The court may not grant an application ­under clause (i) ­unless the court — inds that it clearly appears — rom speci — ic — acts that —­  (I) an order issued pursuant to Rule 65 o — the Federal Rules o —

                                                   Civil Procedure or another  --- orm o ---  equitable relie ---  would
                                                   be inadequate to achieve the purpose o ---  this paragraph
                                                   ­because the party to which the order would be issued would
                                                    evade, avoid, or other­wise not comply with such an order;
                                              (II) an immediate and irreparable injury ­will occur i ---  such sei-
                                                   zure is not ordered;
                                             (III) the harm to the applicant o ---  denying the application out-
                                                   weighs the harm to the legitimate interests o ---  the person
                                                   against whom seizure would be ordered o ---  granting the
                                                   application and substantially outweighs the harm to any
                                                   third parties who may be harmed by such seizure;


                                                                 233

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 233 1/12/26 2:51 PM 234 Appendix B

                                                             (IV) the applicant is likely to succeed in showing that —­ 
                                                                   (aa) the in --- ormation is a trade secret; and
                                                                   (bb) the person against whom seizure would be
                                                                        ordered —­ 
                                                                        (AA) misappropriated the trade secret o ---  the appli-
                                                                             cant by improper means; or
                                                                        (BB) conspired to use improper means to misap-
                                                                             propriate the trade secret o ---  the applicant;
                                                              (V) the person against whom seizure would be ordered has
                                                                  ­actual possession o ---  —­ 
                                                                   (aa) the trade secret; and
                                                                   (bb) any property to be seized;
                                                             (VI) the application describes with reasonable particular-
                                                                  ity the ­matter to be seized and, to the extent reasonable
                                                                  ­under the circumstances, identi --- ies the location where
                                                                   the ­matter is to be seized;
                                                            (VII) the person against whom seizure would be ordered,
                                                                  or persons acting in concert with such person, would
                                                                  destroy, move, hide, or other­wise make such ­matter inac-
                                                                  cessible to the court, i ---  the applicant ­were to proceed on
                                                                  notice to such person; and
                                                            (VIII) the applicant has not publicized the requested seizure.
                                           (B) Ele­ments o ---  order. I ---  an order is issued ­under subparagraph (A), it
                                               ­shall —­ 
                                                  (i) set  --- orth  --- indings o ---

act and conclusions o — law required — or the order; (ii) provide — or the narrowest seizure o — property necessary to achieve the purpose o — this paragraph and direct that the seizure be con- ducted in a manner that minimizes any interruption o — the busi- ness operations o — third parties and, to the extent pos­si­ble, does not interrupt the legitimate business operations o — the person accused o — misappropriating the trade secret; (iii) (I) be accompanied by an order protecting the seized prop- erty — rom disclosure by prohibiting access by the appli- cant or the person against whom the order is directed, and prohibiting any copies, in ­whole or in part, o — the seized property, to prevent undue damage to the party against whom the order has issued or ­others, ­until such parties have an opportunity to be heard in court; and

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 234 1/12/26 2:51 PM Appendix B 235

                                             (II) provide that i ---  access is granted by the court to the applicant
                                                  or the person against whom the order is directed, the access
                                                  ­shall be consistent with subparagraph (D);
                                      (iv) provide guidance to the law en --- orcement o ---

icials executing the seizure that clearly delineates the scope o — the authority o — the o —


icials, including —­  (I) the hours during which the seizure may be executed; and (II) whether — orce may be used to access locked areas; (v) set a date — or a hearing described in subparagraph (F) at the ear- liest pos­si­ble time, and not l­ater than 7 days ­a — ter the order has issued, ­unless the party against whom the order is directed and ­others harmed by the order consent to another date — or the hear- ing, except that a party against whom the order has issued or any person harmed by the order may move the court at any time to dissolve or modi — y the order ­a — ter giving notice to the applicant who obtained the order; and (vi) require the person obtaining the order to provide the security determined adequate by the court — or the payment o — the dam- ages that any person may be entitled to recover as a result o — a wrong — ul or excessive seizure or wrong — ul or excessive attempted seizure ­under this paragraph. (C) Protection — rom publicity. The court ­shall take appropriate action to protect the person against whom an order ­under this paragraph is directed — rom publicity, by or at the behest o — the person obtaining the order, about such order and any seizure ­under such order. (D) Materials in custody o — court. (i) In general. Any materials seized ­under this paragraph ­shall be taken into the custody o — the court. The court ­shall secure the seized material — rom physical and electronic access during the seizure and while in the custody o — the court. (ii) Storage medium. I — the seized material includes a storage medium, or i — the seized material is stored on a storage medium, the court ­shall prohibit the medium — rom being connected to a network or the Internet without the consent o — both parties, ­until the hearing required ­under subparagraph (B)(v) and described in subpara- graph (F). (iii) Protection o — con — identiality. The court s­hall take appropriate ­measures to protect the con — identiality o — seized materials that are unrelated to the trade secret in — ormation ordered seized pur- suant to this paragraph ­unless the person against whom the order is entered consents to disclosure o — the material.

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 235 1/12/26 2:51 PM 236 Appendix B

                                                  (iv) Appointment o ---  special master. The court may appoint a spe-
                                                       cial master to locate and isolate all misappropriated trade secret
                                                       in --- ormation and to  --- acilitate the return o ---  unrelated property and
                                                       data to the person  --- rom whom the property was seized. The spe-
                                                       cial master appointed by the court ­shall agree to be bound by a
                                                       non-­disclosure agreement approved by the court.
                                           (E)	­Service o ---  order. The court ­shall order that ­service o ---  a copy o ---  the
                                                order ­under this paragraph, and the submissions o ---  the applicant to
                                                obtain the order, ­shall be made by a Federal law en --- orcement o ---

icer who, upon making ­service, ­shall carry out the seizure ­under the order. The court may allow State or local law en — orcement o —


icials to partici- pate, but may not permit the applicant or any agent o — the applicant to participate in the seizure. At the request o — law en — orcement o —


i- cials, the court may allow a technical expert who is una —


iliated with the applicant and who is bound by a court-­approved non-­disclosure agreement to participate in the seizure i — the court determines that the participation o — the expert ­will aid the e —


icient execution o — and minimize the burden o — the seizure. (F) Seizure hearing. (i) Date. A court that issues a seizure order ­shall hold a hearing on the date set by the court ­under subparagraph (B)(v). (ii) Burden o — proo — . At a hearing held ­under this subparagraph, the party who obtained the order ­under subparagraph (A) ­shall have the burden to prove the — acts supporting the — indings o —


act and conclusions o — law necessary to support the order. I — the party


ails to meet that burden, the seizure order ­shall be dissolved or modi — ied appropriately. (iii) Dissolution or modi — ication o — order. A party against whom the order has been issued or any person harmed by the order may move the court at any time to dissolve or modi — y the order ­a — ter giving notice to the party who obtained the order. (iv) Discovery time limits. The court may make such ­orders modi — y- ing the time limits — or discovery ­under the Federal Rules o — Civil Procedure as may be necessary to prevent the — rustration o — the purposes o — a hearing ­under this subparagraph. (G) Action — or damage caused by wrong — ul seizure. A person who su —


ers damage by reason o — a wrong — ul or excessive seizure ­under this para- graph has a cause o — action against the applicant — or the order ­under which such seizure was made, and ­shall be entitled to the same relie —

                                               as is provided ­under section 34(d)(11) o ---  the Trademark Act o ---  1946
                                               (15 U.S.C. 1116(d)(11)). The security posted with the court ­under

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 236 1/12/26 2:51 PM Appendix B 237

                                      subparagraph (B)(vi) ­shall not limit the recovery o ---  third parties  --- or
                                      damages.
                               (H) Motion  --- or encryption. A party or a person who claims to have an
                                   interest in the subject ­matter seized may make a motion at any time,
                                   which may be heard ex parte, to encrypt any material seized or to be
                                   seized ­under this paragraph that is stored on a storage medium. The
                                   motion ­shall include, when pos­si­ble, the desired encryption method.
                          (3) Remedies. In a civil action brought ­under this subsection with re­spect to
                              the misappropriation o ---  a trade secret, a court may —­ 
                               (A) grant an injunction —­ 
                                       (i) to prevent any ­actual or threatened misappropriation described
                                           in paragraph (1) on such terms as the court deems reasonable,
                                           provided the order does not —­ 
                                              (I) prevent a person  --- rom entering into an employment rela-
                                                  tionship, and that conditions placed on such employment
                                                  ­shall be based on evidence o ---  threatened misappropriation
                                                   and not merely on the in --- ormation the person knows; or
                                             (II) other­wise con --- lict with an applicable State law prohibiting
                                                  restraints on the practice o ---  a law --- ul pro --- ession, trade, or
                                                  business;
                                       (ii) i ---  determined appropriate by the court, requiring a ---

irmative actions to be taken to protect the trade secret; and (iii) in exceptional circumstances that render an injunction inequi- table, that conditions ­ — uture use o — the trade secret upon payment o — a reasonable royalty — or no longer than the period o — time — or which such use could have been prohibited; (B) award —­  (i) (I) damages — or ­actual loss caused by the misappropriation o —

                                                  the trade secret; and
                                             (II) damages  --- or any unjust enrichment caused by the misappro-
                                                  priation o ---  the trade secret that is not addressed in comput-
                                                  ing damages  --- or ­actual loss; or
                                      (ii) in lieu o ---  damages ­measured by any other methods, the damages
                                           caused by the misappropriation ­measured by imposition o ---  liabil-
                                           ity  --- or a reasonable royalty  --- or the misappropriator’s unauthor-
                                           ized disclosure or use o ---  the trade secret;
                               (C) i ---  the trade secret is will --- ully and maliciously misappropriated, award
                                   exemplary damages in an amount not more than 2 times the amount
                                   o ---  the damages awarded ­under subparagraph (B); and

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 237 1/12/26 2:51 PM (D) i — a claim o — the misappropriation is made in bad — aith, which may be established by circumstantial evidence, a motion to terminate an injunction is made or opposed in bad — aith, or the trade secret was will — ully and maliciously misappropriated, award reasonable attor- ney’s — ees to the prevailing party. (c) Jurisdiction. The district courts o — the United States ­shall have original juris- diction o — civil actions brought ­under this section. (d) Period o — limitations. A civil action ­under subsection (b) may not be com- menced ­later than 3 years ­a — ter the date on which the misappropriation with re­spect to which the action would relate is discovered or by the exercise o — reasonable diligence should have been discovered. For purposes o — this subsection, a continuing misap- propriation constitutes a single claim o — misappropriation.

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 238 1/12/26 2:51 PM Appendix C Economic Espionage Act (EEA, including § 1831 and § 1832)

                   (a) In general. Whoever, intending or knowing that the o ---

ense ­will bene — it any


oreign government, — oreign instrumentality, or — oreign agent, knowingly —­  (1) steals, or without authorization appropriates, takes, carries away, or con- ceals, or by — raud, arti — ice, or deception obtains a trade secret; (2) without authorization copies, duplicates, sketches, draws, photo­graphs, downloads, uploads, alters, destroys, photocopies, replicates, transmits, delivers, sends, mails, communicates, or conveys a trade secret; (3) receives, buys, or possesses a trade secret, knowing the same to have been stolen or appropriated, obtained, or converted without authorization; (4) attempts to commit any o —


ense described in any o — paragraphs (1) through (3); or (5) conspires with one or more other persons to commit any o —


ense described in any o — paragraphs (1) through (3), and one or more o — such persons do any act to e —


ect the object o — the conspiracy, ­shall, except as provided in subsection (b), be — ined not more than $5,000,000 or imprisoned not more than 15 years, or both. (b) ­Organizations. Any ­organization that commits any o —


ense described in sub- section (a) ­shall be — ined not more than the greater o — $10,000,000 or 3 times the value o — the stolen trade secret to the ­organization, including expenses — or research and design and other costs o — reproducing the trade secret that the ­organization has thereby avoided.

                                                     18 USC § 1832.
                                                   The --- t o ---  trade secrets
                    (a) Whoever, with intent to convert a trade secret, that is related to a product or
                ­service used in or intended  --- or use in interstate or  --- oreign commerce, to the economic
                bene --- it o ---  anyone other than the ­owner thereo --- , and intending or knowing that the
                o ---

ense ­will, injure any ­owner o — that trade secret, knowingly —­ 

                                                            239

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 239 1/12/26 2:51 PM 240 Appendix C

                                      (1) steals, or without authorization appropriates, takes, carries away, or con-
                                          ceals, or by  --- raud, arti --- ice, or deception obtains such in --- ormation;
                                      (2) without authorization copies, duplicates, sketches, draws, photo­graphs,
                                          downloads, uploads, alters, destroys, photocopies, replicates, transmits,
                                          delivers, sends, mails, communicates, or conveys such in --- ormation;
                                      (3) receives, buys, or possesses such in --- ormation, knowing the same to have
                                          been stolen or appropriated, obtained, or converted without authorization;
                                      (4) attempts to commit any o ---

ense described in paragraphs (1) through (3); or (5) conspires with one or more other persons to commit any o —


ense described in paragraphs (1) through (3), and one or more o — such persons do any act to e —


ect the object o — the conspiracy, ­ shall, except as provided in subsection (b), be — ined ­under this title or imprisoned not more than 10 years, or both. (b) Any ­organization that commits any o —


ense described in subsection (a) ­shall be


ined not more than the greater o — $5,000,000 or 3 times the value o — the stolen trade secret to the ­organization, including expenses — or research and design and other costs o — reproducing the trade secret that the ­organization has thereby avoided.

                                                             18 USC § 1833.
                                                        Exceptions to prohibitions
                               (a) In general. This chapter [18 USCS §§ 1831 et seq.] does not prohibit or create
                            a private right o ---  action  --- or —­ 
                                      (1) any other­wise law --- ul activity conducted by a governmental entity o ---  the
                                          United States, a State, or a ­political subdivision o ---  a State; or
                                      (2) the disclosure o ---  a trade secret in accordance with subsection (b).
                               (b) Immunity  --- rom liability  --- or con --- idential disclosure o ---  a trade secret to the gov-
                            ernment or in a court  --- iling.
                                      (1) Immunity. An individual ­shall not be held criminally or civilly liable ­under
                                          any Federal or State trade secret law  --- or the disclosure o ---  a trade secret
                                          that —­ 
                                           (A) is made —­ 
                                                   (i) in con --- idence to a Federal, State, or local government o ---

icial, ­either directly or indirectly, or to an attorney; and (ii) solely — or the purpose o — reporting or investigating a suspected violation o — law; or (B) is made in a complaint or other document — iled in a lawsuit or other proceeding, i — such — iling is made ­under seal.

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 240 1/12/26 2:51 PM Appendix C 241

                          (2) Use o ---  trade secret in --- ormation in anti-­retaliation lawsuit. An individual
                              who  --- iles a lawsuit  --- or retaliation by an employer  --- or reporting a suspected
                              violation o ---  law may disclose the trade secret to the attorney o ---  the indi-
                              vidual and use the trade secret in --- ormation in the court proceeding, i ---  the
                              individual —­ 
                               (A)  --- iles any document containing the trade secret ­under seal; and
                               (B) does not disclose the trade secret, except pursuant to court order.
                          (3) Notice.
                               (A) In general. An employer ­shall provide notice o ---  the immunity set  --- orth
                                   in this subsection in any contract or agreement with an employee that
                                   governs the use o ---  a trade secret or other con --- idential in --- ormation.
                               (B) Policy document. An employer ­shall be considered to be in compli-
                                   ance with the notice requirement in subparagraph (A) i ---  the employer
                                   provides a cross-­re --- erence to a policy document provided to the
                                   employee that sets  --- orth the employer’s reporting policy  --- or a sus-
                                   pected violation o ---  law.
                               (C) Non-­compliance. I ---  an employer does not comply with the notice
                                   requirement in subparagraph (A), the employer may not be awarded
                                   exemplary damages or attorney  --- ees ­under subparagraph (C) or (D)
                                   o ---  section 1836(b)(3) [18 USCS § 1836(b)(3)] in an action against an
                                   employee to whom notice was not provided.
                               (D) Applicability. This paragraph ­shall apply to contracts and agreements
                                   that are entered into or updated ­a --- ter the date o ---  enactment o ---  this
                                   subsection [enacted May 11, 2016].
                          (4) Employee de --- ined. For purposes o ---  this subsection, the term “employee”
                              includes any individual per --- orming work as a contractor or ­consultant  --- or
                              an employer.
                          (5) Rule o ---  construction. Except as expressly provided  --- or ­under this subsec-
                              tion, nothing in this subsection ­shall be construed to authorize, or limit
                              liability  --- or, an act that is other­wise prohibited by law, such as the unlaw --- ul
                              access o ---  material by unauthorized means.



                                                      18 USC § 1834.
                                                     Criminal  --- or --- eiture
                   For --- eiture, destruction, and restitution relating to this chapter [18 USCS §§ 1831 et
                seq.] ­shall be subject to section 2323 [18 USCS § 2323], to the extent provided in that
                section, in addition to any other similar remedies provided by law.

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 241 1/12/26 2:51 PM 242 Appendix C

                                                         18 USC § 1835.
                                               ­Orders to preserve con --- identiality
                               (a) In general. In any prosecution or other proceeding ­under this chapter [18
                            USCS §§ 1831 et seq.], the court ­shall enter such ­orders and take such other action as
                            may be necessary and appropriate to preserve the con --- identiality o ---  trade secrets, con-
                            sistent with the requirements o ---  the Federal Rules o ---  Criminal and Civil Procedure,
                            the Federal Rules o ---  Evidence, and all other applicable laws. An interlocutory appeal
                            by the United States ­shall lie  --- rom a decision or order o ---  a district court authorizing
                            or directing the disclosure o ---  any trade secret.
                                (b) Rights o ---  trade secret ­owners. The court may not authorize or direct the dis-
                            closure o ---  any in --- ormation the ­owner asserts to be a trade secret ­unless the court
                            allows the ­owner the opportunity to  --- ile a submission ­under seal that describes the
                            interest o ---  the ­owner in keeping the in --- ormation con --- idential. No submission ­under
                             seal made ­under this subsection may be used in a prosecution ­under this chapter [18
                            USCS §§ 1831 et seq.]  --- or any purpose other than ­those set  --- orth in this section, or
                            other­wise required by law. The provision o ---  in --- ormation relating to a trade secret to
                            the United States or the court in connection with a prosecution ­under this chapter [18
                            USCS §§ 1831 et seq.] ­shall not constitute a waiver o ---  trade secret protection, and the
                            disclosure o ---  in --- ormation relating to a trade secret in connection with a prosecution
                            ­under this chapter [18 USCS §§ 1831 et seq.] ­shall not constitute a waiver o ---  trade
                             secret protection ­unless the trade secret ­owner expressly consents to such waiver.


                                                         18 USC § 1837.
                                                 Applicability to conduct outside
                                                        the United States
                               This chapter [18 USCS §§ 1831 et seq.] also applies to conduct occurring outside
                            the United States i ---  —­ 
                               (1) the o ---

ender is a natu­ral person who is a citizen or permanent resident alien o —

                            the United States, or an ­organization ­organized ­under the laws o ---  the United States or
                            a State or ­political subdivision thereo --- ; or
                                (2) an act in  --- urtherance o ---  the o ---

ense was committed in the United States.

                                                          18 USC § 1838.
                                                    Construction with other laws
                               Except as provided in section 1833(b) [18 USCS § 1833(b)], this chapter [18 USCS
                            §§ 1831 et seq.] ­shall not be construed to preempt or displace any other remedies,
                            ­whether civil or criminal, provided by United States Federal, State, commonwealth,

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 242 1/12/26 2:51 PM Appendix C 243

                possession, or territory law  --- or the misappropriation o ---  a trade secret, or to a ---

ect the other­wise law — ul disclosure o — in — ormation by any Government employee ­under sec- tion 552 o — title 5 (commonly known as the Freedom o — In — ormation Act).

                                                            18 USC § 1839.
                                                              De --- initions
                    As used in this chapter [18 USCS §§ 1831 et seq.] —­ 
                  (1) the term “ --- oreign instrumentality” means any agency, bureau, ministry, com-
                ponent, institution, association, or any ­legal, commercial, or business ­organization,
                corporation,  --- irm, or entity that is substantially owned, controlled, sponsored, com-
                manded, managed, or dominated by a  --- oreign government;
                   (2) the term “ --- oreign agent” means any o ---

icer, employee, proxy, servant, del- egate, or representative o — a — oreign government; (3) the term “trade secret” means all — orms and types o —


inancial, business, sci- enti — ic, technical, economic, or engineering in — ormation, including patterns, plans, compilations, program devices, — ormulas, designs, prototypes, methods, techniques, pro­cesses, procedures, programs, or codes, ­whether tangible or intangible, and ­whether or how stored, compiled, or memorialized physically, electronically, graphi- cally, photographically, or in writing i — —­  (A) the ­owner thereo — has taken reasonable ­measures to keep such in — orma- tion secret; and (B) the in — ormation derives i­ndependent economic value, ­actual or poten- tial, — rom not being generally known to, and not being readily ascertain- able through proper means by, another person who can obtain economic value — rom the disclosure or use o — the in — ormation; (4) the term “­owner”, with re­spect to a trade secret, means the person or entity in whom or in which right — ul ­legal or equitable title to, or license in, the trade secret is reposed; (5) the term “misappropriation” means —­  (A) acquisition o — a trade secret o — another by a person who knows or has reason to know that the trade secret was acquired by improper means; or (B) disclosure or use o — a trade secret o — another without express or implied consent by a person who —­  (i) used improper means to acquire knowledge o — the trade secret; (ii) at the time o — disclosure or use, knew or had reason to know that the knowledge o — the trade secret was —­  (I) derived — rom or through a person who had used improper means to acquire the trade secret;

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 243 1/12/26 2:51 PM 244 Appendix C

                                                     (II) acquired ­under circumstances giving rise to a duty to maintain
                                                          the secrecy o ---  the trade secret or limit the use o ---  the trade secret;
                                                          or
                                                   (III) derived  --- rom or through a person who owed a duty to the per-
                                                         son seeking relie ---  to maintain the secrecy o ---  the trade secret or
                                                         limit the use o ---  the trade secret; or
                                            (iii) be --- ore a material change o ---  the position o ---  the person, knew or had
                                                  reason to know that —­ 
                                                      (I) the trade secret was a trade secret; and
                                                     (II) knowledge o ---  the trade secret had been acquired by accident or
                                                          ­mistake;
                                (6) the term “improper means” —­ 
                                      (A) includes the --- t, bribery, misrepre­sen­ta­tion, breach or inducement o ---  a
                                          breach o ---  a duty to maintain secrecy, or espionage through electronic or
                                          other means; and
                                      (B) does not include reverse engineering, i­ndependent derivation, or any
                                          other law --- ul means o ---  acquisition; and
                               (7) the term “Trademark Act o ---  1946” means the Act entitled “An Act to provide

or the registration and protection o — trademarks used in commerce, to carry out the provisions o — certain international conventions, and — or other purposes, approved July 5, 1946 (15 U.S.C. 1051 et seq.) (commonly re — erred to as the ‘Trademark Act o —

                            1946’ or the ‘Lanham Act’)”.

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 244 1/12/26 2:51 PM Appendix D Glossary

                   This comprehensive taxonomy ­organizes key concepts related to trade secrets
                into structured categories and provides a concise hashtag  --- or each concept. It priori-
                tizes US trade secret law (covering statutes like the UTSA and DTSA, case law, and
                en --- orcement) while also including impor­tant international  --- rameworks (e.g., WIPO
                guidelines, the EU Trade Secrets Directive, GDPR impacts, Chinese trade secret
                laws). Beyond l­egal doctrines, it encompasses business strategies (like licensing and
                M&A), operational practices (security ­measures and employee training), technical
                threats (cybersecurity and AI risks), and policy issues (compliance and competition
                law). Each hashtag is de --- ined with its meaning, importance, and context, and cross-­
                re --- erences to related hashtags are provided to show how ­these concepts intersect.



                                                 General Concepts and
                                                     Importance
                   This category lays the groundwork by de --- ining what trade secrets are, why con --- iden-
                tiality is critical, and how ­these concepts drive competitive advantage and innovation.
                # TS —­ Trade secrets: Con --- idential business in --- ormation (such as  --- ormulas, pro­cesses,
                customer lists, or strategies) that derives its economic value  --- rom not being generally
                known and is maintained through active, reasonable ­measures. A com­pany’s trade
                secrets are the cornerstone o ---  its competitive edge, as they enable innovation and cost
                leadership. To preserve this protection, businesses must implement security proto-
                cols, train employees, and use ­legal tools like #NDA. This term connects closely with
                #FactualSecrecy and #Con --- identialIn --- o, ensuring that in --- ormation remains exclusive
                and supports the  --- irm’s overall #CompetitiveAdvantage.
                # FactualSecrecy —­ In --- ormation claimed as a trade secret is genuinely unknown or
                not easily accessible to ­others. Even i ---  some components derive  --- rom public sources,
                the speci --- ic combination or details must remain hidden. This concept rein --- orces trade
                secrets (#TS) by emphasizing that true secrecy is essential  --- or maintaining competi-
                tive advantage and is directly linked to #Con --- identialIn --- o.



                                                            245

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 245 1/12/26 2:51 PM 246 Appendix D

                            # IP —­ Intellectual property: The broad l­egal category encompassing patents, copy-
                            rights, trademarks, and trade secrets. Within this  --- ramework, trade secrets (#TS) do
                            not require registration but depend on maintaining con --- identiality. Each method o ---

                            protection o ---

ers distinct advantages and limitations, and #IP connects all ­these — orms ­under one umbrella — or an ­organization’s innovation strategy. # Con — identialIn — o —­ Con — idential in — ormation: Re — ers to any nonpublic data that a business actively protects to preserve its competitive edge. Proper ­handling —­ e.g., using #NDAs, access restrictions, and secure systems —­ is essential to maintain in — or- mation as a trade secret (#TS) and uphold a #CompetitiveAdvantage. # CompetitiveAdvantage —­ Competitive advantage is the bene — it a com­pany gains when it outper — orms its rivals, o — ten by leveraging exclusive or con — idential in — orma- tion. Trade secrets (#TS) and con — idential in — ormation (#Con — identialIn — o) are key ­drivers o — this advantage ­because they prevent competitors — rom easily replicating success — ul methods. # In — oMosaic —­ In — ormation mosaic: Describes the concept that a unique combination or arrangement o — data points can — orm a protectable trade secret even i — individual ele­ments are public. This unique compilation supports a com­pany’s #CompetitiveAd- vantage by creating value that remains con — idential. # IntangibleAssets —­ ­These are non-­physical resources —­ like trade secrets, patents, and goodwill —­ that hold signi — icant economic value. For trade secrets (#TS), their value lies in the exclusive knowledge they represent and is maintained through con- tinuous protection e —


orts and secrecy. # Innovation —­ Re — ers to the creation o — new products, pro­cesses, or ideas that are o — ten sa — eguarded as trade secrets. By protecting innovative concepts as #TS rather than immediately disclosing them (e.g. via patents), companies maintain an edge over competitors and rein — orce their #CompetitiveAdvantage through a culture o — proac- tive con — identiality.

                                                            ­Legal Frameworks and
                                                                    Statutes
                               This category covers the statutory and doctrinal  --- oundations  --- or trade secret pro-
                            tection, detailing US and international laws that govern trade secrets and the l­egal
                            tools available  --- or en --- orcement.


                            US Doctrines
                               Key statutes and l­egal princi­ples in US law de --- ine trade secrets and provide rem-
                            edies  --- or misappropriation.

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 246 1/12/26 2:51 PM Appendix D 247

                # UTSA —­ Uni --- orm Trade Secrets Act: A model statute ­adopted by most US states
                that clearly de --- ines trade secrets and misappropriation and requires in --- ormation to
                be protected by #ReasonableMea­sures. The UTSA is  --- oundational  --- or establishing
                ­legal rights over #TS at the state level and guides private en --- orcement (it also provides
                 standard remedies, like damages and #Injunctions).
                # DTSA —­ De --- end Trade Secrets Act: A  --- ederal law that provides a nationwide cause o ---

                action  --- or trade secret misappropriation and that aligns with the UTSA while o ---

ering unique remedies such as #ExParteSeizure. Enacted in 2016, it enhances protection o —

                #TS by  --- acilitating access to  --- ederal courts and ensuring consistency across state lines.
                The #DTSA also explic­itly does not preempt state law, so plainti ---

s can pursue both


ederal and state trade secret claims. # EEA —­ Economic Espionage Act: A — ederal law that criminalizes the the — t o — trade secrets, especially when such misappropriation bene — its — oreign entities. The EEA targets deliberate acts o — industrial or economic espionage and the — t, rein — orcing pro- tection through criminal penalties — or #CriminalTSThe — t and complementing civil remedies ­under the #DTSA. # Misappropriation —­ The wrong — ul acquisition, disclosure, or use o — trade secrets without authorization. This core wrong — ul act underlies all trade secret disputes, giv- ing rise to claims — or both civil damages and, in some cases, criminal penalties (­under statutes like the #EEA). # ImproperMeans —­ Re — ers to illegal or unethical methods —­ such as the — t, bribery,


raud, or espionage —­ used to obtain trade secrets. Demonstrating that a de — endant used improper means is critical to a misappropriation claim, and it underscores the need — or companies to take #ReasonableMea­sures to sa — eguard their secrets (since proper means like ­independent discovery or #ReverseEngineering are ­legal). # IndependentDevelopment —­ A de — ense whereby a de — endant claims they created the in — ormation on their own, without relying on the plainti —


’s trade secrets. It dis- tinguishes genuine innovation — rom wrong — ul copying o — #TS, and a showing o —

                ­independent development ­will de --- eat a misappropriation claim.
                # InevitableDisclosure—­ A doctrine suggesting that an employee with deep knowledge
                o ---  trade secrets ­will unavoidably reveal or rely on them when joining a competitor. This
                princi­ple has been used to justi --- y #NonCompete agreements or injunctions preventing
                an employee  --- rom certain employment, and it directly impacts #EmployeeMobility in
                jurisdictions that recognize the doctrine.
                # Whistleblower —­ Whistle­blower protections (in the trade secret context) apply to
                employees who disclose a com­pany’s con --- idential in --- ormation  --- or the sole purpose o ---

                reporting ­legal violations (e.g., reporting  --- raud or wrongdoing to authorities or attor-
                neys). ­Under the DTSA, such whistle­blowers have immunity in certain circumstances,
                ensuring they are not penalized ­under trade secret laws i ---  their disclosure was made
                in con --- idence and solely to report misconduct. This concept distinguishes legitimate

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 247 1/12/26 2:51 PM 248 Appendix D

                            whistleblowing  --- rom misappropriation and is linked to proper #EmployeeMobility
                            (employees changing jobs should not take secrets, but they can report illegality).
                            # EmployeeMobility —­ Addresses the tension between an employee’s right to change
                            jobs and an employer’s need to protect trade secrets (#TS). It is directly in --- luenced by
                            the doctrine o ---  #InevitableDisclosure and the en --- orceability o ---  agreements like #Non-
                            Compete clauses. Law and public policy seek to balance ­ --- ree ­labor mobility with rea-
                            sonable restrictions to prevent trade secret the --- t when employees move to competitors.


                            International and Regional
                            Frameworks
                               Statutory and treaty instruments that harmonize trade secret protection globally,
                            establishing common minimum standards across jurisdictions.
                            # EUTradeSecrets —­ EU Trade Secrets Directive: An EU-­wide directive (Directive
                            (EU) 2016/943) that harmonizes trade secret laws among member states, ensuring
                            consistent protection and en --- orcement practices  --- or #TS across the ­European ­Union. It
                            requires all EU countries to provide ­measures against unlaw --- ul acquisition, use, or dis-
                            closure o ---  trade secrets, raising the baseline protection in regions that previously relied
                            on disparate laws (such as the UK’s breach o ---  con --- idence or varying national statutes).
                            # TRIPS —­ Trade-­Related Aspects o ---  Intellectual Property Rights: A WTO agreement
                            that sets minimum global standards  --- or intellectual property protection, including
                            trade secrets. TRIPS (particularly Article 39) in --- luenced many countries’ domestic
                            laws (including guiding the princi­ples in #UTSA and #DTSA) by requiring protection

or “undisclosed in — ormation” that is secret, has commercial value ­because it is secret, and is subject to reasonable protective ­measures. # ParisConvention —­ An international treaty (1883, as revised) providing baseline intellectual property protections and addressing un — air competition. While it pri- marily deals with patents, trademarks, ­etc., it indirectly supports the protection o —

                            trade secrets as part o ---  the broader #IP  --- ramework through its general provisions
                            against un --- air competition (which member countries interpret to include trade secret
                            misappropriation).
                            # WIPO —­ World Intellectual Property ­Organization: An international body that
                            coordinates intellectual property policies worldwide and promotes best practices.
                            WIPO provides guidance and resources that support trade secret protection princi­
                            ples (even though no single WIPO treaty  --- ocuses solely on trade secrets). It helps
                            countries develop laws consistent with international standards and  --- acilitates coop-
                            eration on IP issues, trade secrets included.
                            # TradeSecretsDirective —­ The  --- ormal EU mandate (another term  --- or the EU Trade
                            Secrets Directive) requiring member states to align their national trade secret laws. It

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 248 1/12/26 2:51 PM Appendix D 249

                ensures uni --- orm de --- initions o ---  trade secrets and remedies  --- or misappropriation across
                ­Europe, reducing country-­by-­country discrepancies in protecting con --- idential in --- or-
                 mation. (See also #EUTradeSecrets, which re --- ers to this harmonized EU  --- ramework.)
                # USMCA —­ United States–­Mexico–­Canada Agreement: A North American trade
                pact that includes strong provisions  --- or protecting trade secrets, rein --- orcing domestic
                standards, and ensuring cross-­border en --- orcement. The USMCA requires all three
                countries to provide civil and criminal penalties  --- or trade secret the --- t (including
                cyber-­the --- t and state-­sponsored misappropriation) and prohibits  --- orced disclosure
                o ---  source code or algorithms as a condition o ---  ­doing business, thus bolstering #TS
                protection in international trade.
                # GDPR —­ General Data Protection Regulation: Although primarily  --- ocused on per-
                sonal data privacy in the EU, the GDPR in --- luences how companies ­handle all sensitive
                in --- ormation. It intersects with trade secret protection ­because stringent data ­handling
                and security requirements apply to con --- idential business data as well. GDPR compli-
                ance (e.g., on data access or deletion requests) may sometimes con --- lict with maintain-
                ing #Con --- identialIn --- o secrecy, posing compliance challenges (#GDPRRisk)  --- or trade
                secret holders.
                # ChinaTradeSecrets —­ Chinese trade secret law: China’s trade secret protection is
                governed largely by the Anti-­Un --- air Competition Law. Recent amendments (2018 and
                2019) signi --- icantly strengthened the law’s de --- initions and remedies  --- or trade secret
                in --- ringement by expanding who can be held liable (including third-­party recipients o ---

                misappropriated secrets), shi --- ting certain burdens o ---  proo ---  to alleged in --- ringers, and
                increasing potential damages. ­These changes signal China’s growing commitment to
                curbing trade secret the --- t and aligning with international standards ­under #TRIPS.
                (They ­were partly spurred by obligations in US–­China trade agreements and aim to
                improve cross-­border en --- orcement cooperation.)
                # TradeAgreements —­ Re --- ers broadly to other bilateral or multilateral accords that
                incorporate trade secret provisions and support a cohesive global  --- ramework  --- or #TS
                protection. Examples include treaties like NAFTA (and its successor #USMCA), the
                Comprehensive and Progressive Agreement  --- or Trans-­Paci --- ic Partnership (CPTPP),
                and vari­ous US–­EU or regional agreements that commit parties to sa --- eguard trade
                secrets. ­These agreements o --- ten require countries to adopt or en --- orce certain trade
                secret laws and  --- acilitate cooperation against cross-­border the --- t.


                Other ­Legal Frameworks
                   Additional ­legal doctrines and regulatory ­measures interact with trade secret law
                to enhance protection and en --- orcement.
                # ReverseEngineering —­ The law --- ul ­process o ---  analyzing a publicly available product
                to deduce its design,  --- ormula, or  --- unctionality (which may include discovering trade

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 249 1/12/26 2:51 PM 250 Appendix D

                            secrets), provided no contractual restrictions (such as an #NDA) are ­violated. Trade
                            secret law permits reverse engineering as a legitimate means o ---  discovery, meaning
                            a com­pany’s #TS ­will not be protected i ---  a competitor  --- igures it out on their own
                            through analy­sis o ---  a law --- ully obtained product.
                            # ExportControls —­ Regulatory ­measures that restrict the international trans --- er o ---

                            sensitive technologies and in --- ormation. They help protect trade secrets by prevent-
                            ing certain technical data or products (which may embody trade secrets)  --- rom being
                            shared with or exported to unauthorized  --- oreign parties. Export controls act as a ­legal
                            sa --- eguard by complementing trade secret policies, especially  --- or industries dealing
                            with de --- ense or high-­tech in --- ormation (and relate to #TradeRegulations and interna-
                            tional en --- orcement).
                            # LawEn --- orcement —­ In this context, it encompasses government actions and investi-
                            gations to combat trade secret the --- t. It includes the work o ---  agencies (like the FBI or
                            DOJ in the United States ) using statutes such as the #EEA to investigate and prosecute
                            the --- t or economic espionage. Strong law en --- orcement cooperation, sometimes involv-
                            ing international agencies like #Interpol, is vital  --- or addressing criminal trade secret
                            cases that cross borders.
                            # Interpol —­ Interpol is an international policing ­organization that supports cross-­
                            border investigations into crimes, including intellectual property the --- t and trade
                            secret misappropriation. Through Interpol’s coordination, countries work together
                            to track and apprehend individuals involved in  --- oreign or #EconomicEspionage, rein-

orcing global en — orcement e —


orts against trade secret the — t.

                                                            Related ­Legal Fields
                               ­These are adjacent ­legal domains that intersect with trade secret law. They a ---

ect its scope, en — orcement, and strategic use within a broader intellectual property port — olio. Many trade secret issues arise at the intersection o — ­these — ields. # PatentLaw —­ Protects inventions by granting exclusive rights in exchange — or public disclosure o — the invention. Unlike trade secrets (#TS), patents require — ull disclosure but then protect against ­independent development or reverse engineering by ­others. Patent law is a complementary — orm o — #IP that must be weighed against trade secret protection; companies o — ten — ace a strategic choice between patenting an invention or keeping it as a trade secret (the patent vs. trade secret decision). # CopyrightLaw —­  Sa — eguards original works o — authorship — ixed in a tangible medium, such as so — tware code, writings, or designs. It overlaps with trade secret protection when companies have con — idential source code or algorithms: they may keep them secret or release them and rely on copyright. However, copyright does not protect under­lying ideas or con — idential know-­how, so it cannot — ully substitute — or trade secret protection o — ­things like — ormulas or pro­cesses.

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 250 1/12/26 2:51 PM Appendix D 251

                # TrademarkLaw —­ Protects brand identi --- iers, like log­os, names, and slogans. While
                largely unrelated to the substance o ---  trade secrets, a strong trademark coupled with
                secret business methods or  --- ormulas (e.g., a  --- amous brand plus a secret ­recipe) can
                strengthen a com­pany’s overall #CompetitiveAdvantage. Trade secret law might also
                protect proprietary branding strategies or product launch plans that are kept con --- i-
                dential be --- ore execution.
                # PropertyLaw —­ Governs owner­ship rights in both tangible and intangible assets,
                including trade secrets. ­There is scholarly debate about ­whether trade secrets are true
                property rights or just contractual/privacy rights, but in practice they are treated as
                valuable #IntangibleAssets that can be bought, sold (licensed), or counted as assets
                o ---  a com­pany.
                # ContractLaw —­ Is central to trade secrets ­because con --- identiality agreements and
                related contracts are  --- oundational protective tools. En --- orcing #NDAs, invention
                assignment agreements, and #NonCompete clauses relies on contract law. Strong con-
                tract law allows companies to bind employees and partners to secrecy obligations,
                which directly supports the protection o ---  #Con --- identialIn --- o.
                # EmploymentLaw —­ Governs the workplace relationship and sets limits on what
                employers can require o ---  employees. It a ---

ects the en — orceability o — #NonCompete agreements and the ­handling o — con — identiality obligations in employment contracts. Employment law strikes a balance between employees’ rights (to change jobs or use general skills) and the employer’s interest in protecting #TS, and it provides remedies


or breaches (o — ten overlapping with trade secret misappropriation claims). #AntitrustLaw —­ Antitrust (competition) law ensures — air competition in the mar- ketplace. It can come into play i — a com­pany’s trade secret en — orcement is so aggres- sive that it sti — les legitimate competition ( — or example, collusion through trade secret licensing or using #NonCompete agreements broadly). Antitrust law and #Competi- tionLaw may also limit how competitors can jointly use in — ormation (to avoid mar- ket allocation or price-­ — ixing masked as trade secret protection). Generally, antitrust issues are rare in trade secret cases, but they remind companies not to misuse trade secrets to violate competition laws. # CyberLaw —­ Covers ­legal issues related to cybersecurity, hacking, and data breaches. With most trade secrets stored digitally, cyber law is critical: it establishes obliga- tions and liability around protecting electronic trade secrets. It intersects with trade secret law when prosecuting hackers, determining corporate liability — or #DataBreach incidents, and setting standards (like #PrivacyLaw or data security regulations) that companies must — ollow to protect their #TSProtection e —


orts. # PrivacyLaw —­ Regulates the ­handling o — personal and sensitive data (examples include the #GDPR in the EU and laws like CCPA in Cali — ornia). Privacy require- ments o — ten overlap with trade secret management, as companies must ­handle per- sonal data (perhaps o — customers or employees) within their in — ormation systems. In some cases, privacy laws can con — lict with trade secret practices (e.g., an individual’s

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 251 1/12/26 2:51 PM 252 Appendix D

                            right to their personal data versus a com­pany’s desire to keep rec­ords con --- idential),
                            requiring care --- ul compliance (#GDPRCompliance) to protect secrets without violat-
                            ing privacy rights.
                            # WhiteCollarCrime —­ Re --- ers to  --- inancially motivated, nonviolent crime typically
                            committed by business pro --- essionals. Trade secret the --- t and economic espionage  --- all
                            into this category. Prosecuting trade secret the --- t ­under laws like the #EEA or  --- raud
                            statutes is part o ---  white collar crime en --- orcement. This highlights that misappropria-
                            tion is not just a civil ­matter but can rise to serious criminal conduct with signi --- icant
                            penalties.
                            # CorporateLaw —­ Involves the governance o ---  business entities and  --- iduciary duties
                            o ---  directors/o ---

icers. It intersects with trade secrets in areas like #CorporateGover- nance (ensuring com­pany leadership protects key assets like #TS) and in transactions (board decisions about protecting or sharing secrets in deals). Also, i — insiders misap- propriate secrets, it could breach their — iduciary duty to the com­pany, giving rise to corporate law claims alongside trade secret claims. E —


ective #TSManagement is o — ten considered part o — good corporate stewardship o — intellectual assets. # CommercialLitigation —­ The ­process o — resolving business disputes in court, includ- ing trade secret misappropriation lawsuits. Many trade secret en — orcement actions end up as commercial litigation, so understanding the procedures and strategies o —

                            commercial litigation (e.g., discovery, injunction practice, use o ---  #EvidenceLaw) is
                            impor­tant  --- or en --- orcing #TS rights. This  --- ield also covers breach o ---  contract cases (like
                            broken NDAs), which  --- requently accompany trade secret claims.
                            # TortLaw —­ Provides civil remedies  --- or wrong --- ul acts causing harm. Trade secret mis-
                            appropriation can be pleaded as a tort (e.g., as “un --- air competition” or conversion
                            in some jurisdictions, though the UTSA preempts many tort claims in the United
                            States). Tort law princi­ples also come into play with #Un --- airCompetition practices
                            and when seeking #Damages or #ExemplaryDamages  --- or will --- ul misconduct.
                            # CompetitionLaw —­ Competition law (another term  --- or antitrust, especially in an
                            international context) regulates market competition. In the trade secret arena, com-
                            petition law might limit how companies share in --- ormation (e.g., in joint ventures
                            or standard-­setting) or guard against companies’ using trade secret claims to harass
                            competitors. It is related to #AntitrustRisk and ensures that protecting secrets does
                            not cross into anti-­competitive territory.
                            # EvidenceLaw —­ Governs what evidence can be presented in l­egal proceedings. In
                            trade secret litigation, courts must balance the need to prove a case with the need to
                            keep the trade secrets themselves con --- idential. Evidence law questions (like when to
                            allow in-­camera review, protective ­orders, or sealed  --- ilings) are crucial in #TSLawsuit
                            procedures. Proper ­handling o ---  evidence (e.g., showing that in --- ormation was secret
                            and misappropriated) o --- ten determines success in trade secret cases.
                            # AdminLaw —­ Covers the regulations and procedures o ---  government agencies. It can
                            a ---

ect trade secrets in contexts like #ExportControl en — orcement (agencies regulating

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 252 1/12/26 2:51 PM Appendix D 253

                technology exports) or when companies submit trade secret data to agencies (e.g.,
                FDA or EPA  --- ilings) and rely on administrative protections against disclosure.
                Administrative pro­cesses (such as the ITC’s Section 337 investigations  --- or IP the --- t)
                also provide alternative  --- orums  --- or trade secret en --- orcement outside the court system.
                # BankruptcyLaw —­ Addresses how assets are handled when a com­pany becomes
                insolvent. Trade secrets, as #IntangibleAssets, are part o ---  the debtor’s estate. Bank-
                ruptcy law ensures trade secrets are valued and trans --- erred properly (sometimes
                they may be sold to satis --- y creditors, which requires maintaining secrecy during due
                diligence). It also raises questions about the assumption or rejection o ---  NDAs and
                the continuation o ---  con --- identiality obligations i ---  a business is sold out o ---  bankruptcy.



                                            Business and Commercial
                                                 Considerations
                   This category highlights how trade secrets ­ --- actor into business strategies, transac-
                tions, and collaborative ventures. It covers the commercial use and valuation o ---  trade
                secrets, and how companies share or protect ­these assets in deals and partnerships.
                # Licensing —­ The commercial strategy o ---  granting another party rights to use a trade
                secret ­under a contract, typically in exchange  --- or  --- ees or royalties. Proper licensing
                o ---  trade secrets requires maintaining con --- identiality (through strict #Con --- identiality-
                Agreement terms and oversight) so the secret is not publicly disclosed. It can be a way
                to monetize #TS (e.g., licensing a proprietary manu --- acturing ­process to a partner),
                but it carries #AntitrustRisk i ---  done between competitors and always requires trust
                and veri --- ication that the licensee upholds secrecy obligations (related to #TechTrans-

er and #JointVenture scenarios). # TechTrans — er —­ The controlled sharing o — trade secrets or proprietary technology between entities, o — ten through collaborative agreements, research partnerships, or joint development proj­ects. This can occur via #Licensing deals, university–­industry collaborations, or cross-­border partnerships. Managing tech trans — er involves ensur- ing the receiving party implements adequate protections and complies with any #ExportControl laws. It is closely related to #JointVenture arrangements and o — ten necessitates detailed contracts de — ining permitted use o — the shared know-­how. # JointVenture —­ A business arrangement where two or more companies collabo- rate ( — orming a new entity or a — ormal alliance) and may need to share their respec- tive trade secrets or know-­how to achieve a common goal. In a JV, care — ul l­egal and operational sa — eguards are required: each side should disclose only what is necessary (#NeedToKnowFailure must be avoided), and agreements must speci — y owner­ship and permitted use o — any contributed #Con — identialIn — o. JVs tie into #TechTrans — er (as a mechanism o — sharing) and pose #ThirdPartyRisk i — one partner mishandles the other’s secrets.

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 253 1/12/26 2:51 PM 254 Appendix D

                            # MergersAcq —­ Mergers and Acquisitions: Trade secrets o --- ten play a signi --- icant role
                            in M&A transactions as valuable assets that can enhance the acquiring com­pany’s
                            competitive position. This concept covers how trade secrets are handled during merg-
                            ers, acquisitions, or divestitures —­ including their evaluation and pricing (#Valu-
                            ation); disclosure to the acquirer ­under con --- identiality during #DueDiligence; and
                            post-­transaction integration, where combining work --- orces and systems must be done
                            without losing secrecy. #M&ARisk is a related concept  --- ocusing on the risk o ---  leaks
                            during ­these deal pro­cesses.

                            # DueDiligence —­ The ­process o ---  assessing assets and risks be --- ore entering a business
                            transaction such as an investment, partnership, or acquisition. In the context o ---  trade
                            secrets, due diligence involves evaluating the target’s #TSProtection ­measures, identi-

ying key trade secrets, and ensuring that any required disclosure o — ­those secrets (to potential buyers, investors, ­etc.) is done ­under strict #NDA and data room security. E —


ective due diligence ­will mitigate #M&ARisk and in — orm proper #Valuation o — the trade secret assets.

                            # Valuation —­ Determining the  --- inancial worth o ---  trade secrets  --- or purposes o ---  trans-
                            actions, litigation, or internal strategy. Companies per --- orm valuation o ---  trade secrets
                            during #MergersAcq (to set a price or assess goodwill), when licensing technology, or
                            when seeking damages in a #TSLawsuit (where a reasonable royalty or lost pro --- its may
                            be calculated). Accurate valuation re --- lects a trade secret’s contribution to #Competi-
                            tiveAdvantage and may consider ­ --- actors like development cost savings, ­ --- uture income
                            streams, and risk o ---  loss. It ties into treating trade secrets as #IntangibleAssets on the
                            balance sheet.

                            # OpenInnovation —­ Re --- ers to collaborative innovation initiatives where a com­pany
                            works with external parties (such as open-­source communities, crowdsourcing plat-

orms, or industry consortia) to develop new ideas. The challenge in open innovation is balancing collaboration with secrecy; participants share knowledge but must be care — ul not to reveal core #TS. Companies engaged in open innovation o — ten delin- eate what in — ormation can be openly shared and what must remain internal. This concept intersects with #ThirdPartyRisk (external collaborators could leak in — o) and may require a shi — t — rom a strict #CultureO — Secrecy to a more nuanced approach that still protects key secrets.

                            # Outsourcing —­ Outsourcing involves hiring external  --- irms or contractors to per --- orm
                            ­services or develop products, which can expose trade secrets i ---  ­those external enti-
                             ties ­handle sensitive in --- ormation. Protecting #TS during outsourcing requires robust
                             contracts (#Con --- identialityAgreement clauses, clear IP owner­ship) and oversight o ---

                             the vendor’s security practices. This concept highlights the need to extend internal
                             #SecurityPolicy and #TSProtection ­measures to third parties. It is closely related to
                             #VendorRisk and #ThirdPartyRisk, since an outsourcer’s weak security or its person-
                             nel could lead to misappropriation o ---  the client com­pany’s secrets.

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 254 1/12/26 2:51 PM Appendix D 255

                                                       Risks and Threats
                   This category identi --- ies the dangers that can lead to the misappropriation or loss
                o ---  trade secrets, including external threats, l­egal pit --- alls, regulatory challenges, eco-
                nomic pressures, and technological vulnerabilities.


                External Risks
                   Risks arising  --- rom external actors or ­ --- actors that may expose or compromise trade
                secrets.
                # EconomicEspionage —­ Involves deliberate the --- t o ---  trade secrets  --- or  --- inancial or
                competitive gain, o --- ten orchestrated by businesses or state-­sponsored actors target-
                ing  --- oreign companies. Such actions undermine a com­pany’s #CompetitiveAdvantage
                and are punishable ­under criminal laws like the #EEA (which speci --- ically addresses
                espionage bene --- iting  --- oreign entities).
                # IndustrialEspionage —­ The covert collection o ---  con --- idential in --- ormation by com-
                petitors seeking a market edge. This can include spying on a competitor’s  --- acilities,
                in --- iltrating their work --- orce, or eavesdropping on communications. It  --- requently over-
                laps with economic espionage tactics and can encompass both #CorporateEspionage
                and #CyberThreats modes o ---  operation.
                # CorporateEspionage —­ Re --- ers to espionage activities carried out by or against com-
                panies (as opposed to state actors) to illicitly obtain con --- idential business data. This
                threatens #TS by enabling competitors to acquire proprietary know-­how or strategies.
                It impacts #CompetitiveAdvantage and o --- ten involves #ImproperMeans, such as brib-
                ing insiders or covert surveillance.
                # ForeignEspionage —­ Involves the the --- t o ---  trade secrets by state-­sponsored agents
                or entities a ---

iliated with — oreign governments. The goal is o — ten to bolster national industries or military capabilities using stolen technology. Such acts are a — ocus o — the #EEA (which has provisions — or — oreign government-­sponsored the — t) and underscore the need — or international cooperation and robust #LawEn — orcement e —


orts. # CyberThreats —­ Include digital attacks such as hacking, malware, ransomware, or phishing that target a com­pany’s con — idential in — ormation systems. Modern trade secrets are — requently stored digitally, so cyberattacks can compromise #TSProtection ­measures and lead to massive #DataBreach incidents. Companies must ­counter cyber threats with strong #EndpointSecurity, network monitoring, and incident response plans. # DataBreach —­ A data breach is the unauthorized access, acquisition, or disclosure o —

                sensitive in --- ormation, o --- ten through cyberattack or accidental exposure. I ---  the com-
                promised data includes trade secrets or #Con --- identialIn --- o, the breach can destroy the

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 255 1/12/26 2:51 PM 256 Appendix D

                            in --- ormation’s secrecy and value. Data breach incidents can result  --- rom insu ---

icient security, #InsiderThreat, or external hacking, and they o — ten trigger ­legal obligations to respond and possibly noti — y authorities (though companies try to avoid disclosing exact trade secrets publicly even when reporting breaches). # SupplyChainRisk —­ Supply chain risk arises when third-­party vendors, suppliers, or partners with access to a com­pany’s in — ormation — ail to secure it properly. A weakness anywhere in the supply chain (e.g., a parts manu — acturer or an IT ­services provider) can lead to trade secret leakage. This concept highlights that a com­pany’s #TS is only as secure as the weakest link among its external collaborators, tying into #ThirdPar- tyRisk and emphasizing the need — or #SupplyChainSecurity practices. # ThirdPartyRisk —­ Third-­party risk is the possibility that external partners, contrac- tors, or vendors may mishandle or inadvertently expose con — idential data entrusted to them. When companies share #Con — identialIn — o with outside parties ( — or out- sourcing, partnerships, cloud ­services, ­etc.), ­those parties’ security lapses or internal threats become an indirect risk. Third-­party risk underscores why contracts, due dili- gence, and ongoing oversight o — partners are critical — or protecting #TS outside the ­organization’s walls. # OverrelianceOnNDAs —­ The mistaken belie — that nondisclosure agreements alone are su —


icient to protect trade secrets. While #NDAs are essential l­egal tools, the risk is that a com­pany might neglect technical and administrative #ReasonableMea­sures (like access controls, encryption, and monitoring) based on the belie — that paper agreements ­will prevent leaks. Overreliance on NDAs can give a — alse sense o — secu- rity: i — an NDA is breached, the damage may already be done ­unless other protections are in place. # CompetitorThreat —­ Re — ers to the active e —


orts by rival companies to acquire a target com­pany’s con — idential in — ormation in order to weaken that target’s #Com- petitiveAdvantage. Competitors might use #CorporateEspionage, #TalentPoaching, aggressive #ReverseEngineering, or other tactics that, i — crossing ­legal lines, amount to misappropriation. This concept underscores that competition is not always — air and that companies must be vigilant about competitor-­driven risks. # TalentPoaching —­ The deliberate hiring away o — a competitor’s employees with the intent to gain access to their expertise or trade secret knowledge. While recruiting experienced talent is ­legal, ­doing so speci — ically to obtain con — idential know-­how can lead to inevitable disclosure o — the — ormer employer’s #TS. This practice raises con- cerns ­under #EmployeeMobility: it tests the limits o — what a new hire can use — rom memory versus what is protected, and it o — ten triggers #NonCompete disputes or litigation i — ­there is suspicion o — trade secret the — t. # WhistleblowerRisk —­ The potential that an employee, in disclosing wrongdoing to authorities or the public, might inadvertently or intentionally reveal trade secrets. It blurs the line between legitimate reporting (protected by #Whistleblower laws) and

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 256 1/12/26 2:51 PM Appendix D 257

                trade secret misappropriation. Companies mitigate this risk by having internal com-
                pliance programs (so issues can be reported internally ­under con --- identiality) and by
                narrowly tailoring secrecy policies so they do not unlaw --- ully silence whistleblowing.


                ­Legal Risks
                   Risks arising  --- rom l­egal challenges, disputes, or weaknesses in a com­pany’s intel-
                lectual property strategy that could weaken trade secret protection.
                # LitigationRisk —­ The potential  --- or costly and damaging l­egal disputes over trade
                secret issues. This includes the risk o ---  being sued  --- or misappropriation (de --- ense costs,
                injunctions stopping your product) or the need to sue another (which can be expen-
                sive and expose your secrets in court). High-­pro --- ile #TSLawsuits can also damage a
                com­pany’s reputation or distract management. E ---

ective #IPStrategy and clear agree- ments can reduce litigation risk, but i — a dispute arises, skilled #CommercialLitigation management is needed. # WeakIPStrategy —­ Re — ers to a com­pany’s choosing the wrong — orm o — intellectual property protection or not adequately protecting an innovation at all. For example, patenting an invention that would have been better kept as a secret (thereby disclosing it to competitors), or vice versa, or — ailing to identi — y key trade secrets to protect. This misstep can leave valuable in — ormation exposed or unprotected, undermining overall #TS security. It is related to #PatentLaw vs. trade secret decisions and can be revealed during #DueDiligence or #EmploymentDisputes when gaps are discovered. # EmploymentDisputes —­ Con — licts with current or — ormer employees over trade secret issues. This can include claims that an employee stole secrets to bene — it a new employer, wrong — ul termination suits ­a — ter an employee is — ired — or suspected misap- propriation, or ­battles over the scope o — #NonCompete and non-­solicitation agree- ments. Such disputes can result in trade secret litigation and a —


ect #EmployeeMobility broadly within an industry (e.g., a well-­known case might deter other employees — rom jumping ship with knowledge). # BreachO — Contract —­ This risk arises when con — identiality agreements, NDAs, or other contracts meant to protect trade secrets are ­violated. I — an ex-­employee or busi- ness partner breaks their promise and discloses a secret, the contract breach not only undermines #Con — identialIn — o security but also — orces the com­pany to seek remedies through litigation. This risk underlines the importance o — en — orcing #ContractLaw provisions and possibly obtaining #Injunctions quickly when a breach is discovered. #AntitrustRisk —­ Antitrust risk (competition law risk) is the possibility that actions taken to protect or share trade secrets may run a — oul o — competition laws. For instance, i — competitors secretly agree to share certain technical in — ormation only with each other (excluding ­others), it could be seen as collusion. Or overly broad #NonCompete agreements could attract antitrust scrutiny — or suppressing competition. Companies

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 257 1/12/26 2:51 PM 258 Appendix D

                            must ensure their trade secret en --- orcement or collaboration practices do not inadver-
                            tently limit market competition, linking this risk to #CompetitionLaw compliance.


                            Regulatory and Compliance Risks
                              Risks associated with the evolving regulatory landscape and the challenges o ---

                            meeting ­legal disclosure or compliance requirements while protecting trade secrets.
                            # DataProtectionLaws —­ Data protection laws such as the EU’s GDPR or Cali --- ornia’s
                            CCPA impose strict requirements on how sensitive data (including certain business
                            data) is handled, stored, and trans --- erred. Compliance with ­these laws can complicate
                            trade secret management:  --- or example, responding to a regulatory inquiry or data
                            subject access request could risk revealing #Con --- identialIn --- o. Failure to comply is its
                            own risk ( --- ines, penalties), so companies must reconcile data privacy obligations with
                            maintaining #TS secrecy.
                            # ExportControls —­ Regulations limiting the trans --- er o ---  sensitive technology or in --- or-
                            mation across national borders. Noncompliance can result in ­legal penalties and also
                            inadvertently expose trade secrets (e.g., i ---  a com­pany must apply  --- or a license, it might
                            need to describe the technology). Adhering to #ExportControl laws protects against
                            unauthorized  --- oreign access to trade secrets but can be complex and impact collab-
                            orative research or international hiring. It is a compliance risk that intersects with
                            trade secret strategy, especially in high-­tech and de --- ense sectors.
                            # CrossBorderIP —­ Re --- ers to the di ---

iculties in protecting trade secrets across multiple jurisdictions. Di — ­ — er­ent countries may have varying de — initions o — trade secrets or lev- els o — en — orcement, complicating a uni — ied protection strategy. For instance, pursuing a misappropriator who — lees to another country can be hard i — that country’s laws are weaker. This risk underscores the need — or awareness o — international — rameworks (like #TRIPS and local laws such as #ChinaTradeSecrets) and, sometimes, — or pursu- ing remedies like #Interpol notices or multinational litigation. # GDPRRisk —­ Re — ers to the speci — ic challenges posed by the EU’s data protection regime (GDPR) to trade secret practices. For example, GDPR might require a com­ pany to divulge certain personal data it holds i — an individual requests it, even i — that data is part o — an internal database a com­pany considers secret. ­There is also a risk that stringent security and minimization rules a —


ect how companies collect and store proprietary data. Balancing GDPR compliance with #Con — identialIn — o preservation is an ongoing compliance tightrope — or global companies. # TradeSecretDisclosure —­ The danger that a com­pany’s con — idential in — ormation might be revealed during ­legal or regulatory pro­cesses. This can happen in litigation (through #EvidenceLaw requirements or discovery) or in government — ilings (e.g., required submissions to patent o —


ices, courts, or agencies). I — not managed with pro- tective ­orders or con — identiality provisions, such disclosures can destroy #TS status. Companies mitigate this risk by seeking court ­orders to seal rec­ords, by limiting detail

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 258 1/12/26 2:51 PM Appendix D 259

                in public  --- ilings, and by aggressive l­egal strategies to avoid compelled disclosure o ---

                the “crown jewels.”


                Economic Risks
                   Financial pressures and market dynamics that may lead to the loss or devaluation
                o ---  trade secrets.
                    # VendorRisk —­ The potential  --- or external suppliers or ­service providers to mis-
                handle con --- idential data, thereby exposing trade secrets and compromising #TSPro-
                tection. It highlights that outsourcing or relying on third-­party technology (like cloud
                ­services or ­consultants) can introduce vulnerabilities i ---  ­those vendors do not have
                 strong security. Contractual clauses and vendor audits are common mitigations, but
                 this risk is ever-­present in complex supply chains (see #SupplyChainRisk).
                # M&ARisk —­ M&A risk arises during mergers, acquisitions, or due diligence when
                sensitive in --- ormation must be shared with the other party. ­There is a risk a deal may

all through and the would-be buyer walks away with knowledge o — the target’s secrets or that during integration, employees — rom the acquiring com­pany improperly access the acquired com­pany’s con — idential in — o. Such scenarios can undermine a com­pany’s #IntangibleAssets value. Care — ul staging o — disclosure (only as needed), use o — clean teams, and strong l­egal remedies in deal contracts help reduce M&A-­related trade secret risk. # EconomicDownturnRisk —­ Re — ers to increased vulnerability o — trade secrets dur- ing tough economic times. In recessions or budget-­cutting phases, companies might reduce spending on security or personnel training, or they may lay o —


employees (who could leave with knowledge or be disgruntled). Financial strain can also lead some to be more susceptible to selling secrets. Maintaining #TSProtection as a prior- ity during downturns is critical despite pressure to cut costs. # InvestorRisk —­ The possibility that during — und­rais­ing rounds or investor meetings, a startup or com­pany might inadvertently disclose trade secrets to potential investors or analysts, reducing its #CompetitiveAdvantage. While investors o — ten sign con — i- dentiality agreements, the more ­people who know a secret, the greater the risk o —

                leaks. Additionally, once investors are on board, they receive reports and data that
                could contain secrets. Companies must strike a balance between transparency with
                investors and sa --- eguarding key details.


                Technological Risks
                  Risks stemming  --- rom digital vulnerabilities and emerging technologies that could
                compromise trade secrets.
                  # AITradeSecretThe --- t —­ Re --- ers to the risk that advanced arti --- icial intelligence tools
                could be used to in --- er or extract con --- idential in --- ormation  --- rom available data. For

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 259 1/12/26 2:51 PM 260 Appendix D

                            example, an AI might analyze outputs or patterns ( --- rom a product or code) to recon-
                            struct the under­lying secret algorithm. As AI grows more power­ --- ul, traditional #TS
                            sa --- eguards may be challenged, which ­will require new methods (like monitoring AI
                            outputs or employing AI to detect anomalies) to protect secrets.
                            # WeakEncryption —­ A vulnerability where a com­pany’s data encryption is out-
                            dated or insu ---

icient, allowing attackers to decipher stolen data. I — trade secret — iles or communications are not properly encrypted, a breach could immediately expose their contents. Weak encryption undermines #Con — identialIn — o protection. This risk prompts ­organizations to — ollow strong cryptographic practices and to update encryp- tion methods in anticipation o — threats like #QuantumRisk (quantum computing attacks on encryption). # QuantumRisk —­ Quantum risk is the threat that emerging quantum computing technology could break current encryption methods, putting digitally stored trade secrets at risk. Much o — t­oday’s secure storage relies on encryption that quantum computers may eventually crack. This risk is driving interest in “post-­quantum” cryp- tography. It also relates to #CyberLaw and national security policy, as governments and companies prepare — or a ­ — uture where quantum attackers might target secret data archives. # CloudSecurityRisk —­ Arises when a com­pany stores trade secrets in cloud ­services or remote servers that are not adequately secured or con — igured. While reputable cloud providers invest in security, miscon — igurations (like leaving a storage bucket public) or breaches at the provider could expose secrets. This risk underscores the need — or strong #TSProtection policies speci — ically — or cloud usage: encryption o — data at rest, care — ul identity and access management, and vetting cloud providers’ security protocols. # ZeroTrustFailure —­ Occurs when an ­organization’s “zero trust” security model (which assumes no user or device is trustworthy by de — ault) is not properly imple- mented, thus allowing unauthorized access to sensitive data. I — zero trust princi­ples


ail (due to miscon — iguration or user workarounds), sensitive #TS could be accessed by threat actors who penetrated one part o — the network. This highlights that even modern security — rameworks require continuous assessment. A zero trust approach, when working, can greatly strengthen #TSProtection, but — ailure in any link can open a door to attackers. # ShadowIT —­ The use o — unauthorized hardware, so — tware, or cloud ­services within an ­organization, outside the o —


icial IT in — rastructure. Employees might use personal apps or devices to ­handle work data — or ­convenience. This practice bypasses o —


icial security controls and can lead to trade secret exposure ( — or example, an engineer using an unapproved — ile-­sharing app might inadvertently leak a con — idential design document). Shadow IT is a challenge — or #SecurityPolicy en — orcement and calls — or employee training (#EmployeeTraining) to prevent unsanctioned tech use.

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 260 1/12/26 2:51 PM Appendix D 261

                # DeviceSecurity —­ This risk involves threats like lost, stolen, or compromised devices
                (laptops, USB drives, smartphones) that contain trade secret in --- ormation. I ---  an
                employee’s laptop with unencrypted con --- idential  --- iles is stolen, the trade secrets could
                be revealed. This risk is managed by #EndpointSecurity ­measures such as encryption,
                remote wipe capabilities, and strong authentication. It reminds ­organizations that
                physical loss o ---  hardware can be as damaging as a cyber breach i ---  not mitigated.
                # DeepFakeThreat —­ Re --- ers to the use o ---  AI-­generated audio or video impersonations
                to deceive individuals into disclosing con --- idential in --- ormation. For example, a deep-

ake could mimic an executive’s voice on a phone call to trick an employee into shar- ing a trade secret. This is a novel social-­engineering risk that challenges traditional veri — ication methods. Combating it requires updated policies (like multi-­ — actor veri — i- cation — or sensitive requests) and awareness training, linking it to both #CyberThreats and ­human ­ — actor vulnerabilities.

                Internal Risks
                   This category  --- ocuses on risks originating within the ­organization due to employee
                be­hav­ior, management practices, or ­organizational culture that can lead to the inad-
                vertent or deliberate loss o ---  trade secrets.
                # InsiderThreat —­ The risk that employees, contractors, or other trusted insiders ­will
                intentionally or unintentionally disclose con --- idential in --- ormation. Insiders have
                legitimate access to #Con --- identialIn --- o, so their actions ( --- rom malicious the --- t to care-
                less ­handling) can undermine trade secret protection. E ---

ective mitigation includes monitoring, access controls (“need-­to-­know” princi­ples), and — ostering loyalty and awareness to reduce the likelihood o — insiders turning into threats. # EmployeeNegligence —­ Re — ers to inadvertent ­mistakes by sta —


—­ such as mishandling documents, using weak passwords, — alling — or phishing scams, or losing devices —­ that result in exposure o — trade secrets. This highlights the ­human error component o —

                security. Regular #EmployeeTraining, clear #SecurityPolicy, and technical sa --- eguards
                (like requiring encryption on devices) are used to combat negligence-­related leaks.
                # OnboardingRisk —­ The danger that new hires may bring proprietary in --- ormation

rom their — ormer employer (which is not legally theirs to bring) or that they might mishandle their old employer’s secrets within their new role. This can inadvertently compromise the new employer and violate the old employer’s trade secret rights. Companies mitigate this risk by training new hires not to reveal ­others’ secrets, using “clean room” designs — or sensitive proj­ects, and sometimes delaying start o — assign- ments to avoid #InevitableDisclosure claims. # ExitInterviewRisk —­ The possibility that departing employees may take or — ail to return con — idential in — ormation when they leave a com­pany. I — the o —


boarding ­process is lax —­ no check o — devices, no reminders o — obligations —­ an employee might

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 261 1/12/26 2:51 PM 262 Appendix D

                            walk out with trade secret  --- iles or simply rely on memory o ---  sensitive in --- ormation at a
                            new job. Conducting thorough exit interviews and exit protocols (collecting devices,
                            disabling access, reiterating #NDA obligations) is essential to maintain #TSProtection
                            post-­employment.
                            # NeedToKnowFailure —­ Occurs when con --- idential in --- ormation is shared internally
                            with individuals who do not require it  --- or their work. I ---  a com­pany does not en --- orce
                            need-­to-­know princi­ples, then more employees than necessary ­will know a given
                            trade secret, which ­will increase the odds o ---  accidental or intentional leaks. Such  --- ail-
                            ures weaken internal controls and can be exploited by insiders or through social engi-
                            neering. Maintaining proper #AccessControl and compartmentalization o ---  secrets
                            helps prevent this risk.
                            # CultureO --- Secrecy —­ Means  --- ostering an environment where con --- identiality is a pri-
                            ority and employees understand the importance o ---  protecting in --- ormation. A  --- ailure
                            in this culture (i.e., a culture that does not emphasize secrecy) increases the likeli-
                            hood o ---  trade secret disclosures ­because employees may not take policies seriously
                            or may share in --- ormation casually. Conversely, a strong culture o ---  secrecy supports
                            all other ­measures by making security “every­one’s responsibility.” Balancing this with
                            openness  --- or innovation is impor­tant (too much secrecy can sti --- le collaboration), so
                            leadership must promote prudent con --- identiality.



                                                            Operational Protections
                               This category outlines proactive internal ­measures and policies that ­organizations
                            implement to secure their trade secrets against both internal and external threats.
                            ­These are the best practices and tools  --- or prevention.
                            # TSProtection —­ In practice, this encompasses the overall strategies, policies, and
                            physical/digital sa --- eguards an ­organization uses to secure con --- idential in --- ormation
                            and maintain its secrecy. It is an umbrella concept that includes l­egal agreements,
                            technical security, employee training, and any other method deployed to prevent mis-
                            appropriation or leaks o ---  #TS.
                            # TSManagement —­ The systematic ­process o ---  identi --- ying, classi --- ying, and maintain-
                            ing trade secrets within an ­organization. This involves creating a registry or inven-
                            tory o ---  what the com­pany considers its trade secrets, labeling and securing them
                            appropriately, and regularly auditing t­hese assets. Good #TSManagement ensures
                            no impor­tant secret is overlooked and that all are adequately protected through
                            #ReasonableMea­sures.
                            # TSPP —­ Trade Secret Protection Program: A  --- ormal, comprehensive  --- ramework
                            that a com­pany establishes to sa --- eguard its trade secrets. A #TSPP typically inte-
                            grates multiple ele­ments (asset inventory, risk assessment, employee policies, inci-
                            dent response plans) into one cohesive program. It o --- ten involves cross-­department

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 262 1/12/26 2:51 PM Appendix D 263

                coordination (­legal, IT, HR, physical security) and is reviewed and updated over time
                as new threats emerge.
                # ReasonableMeasures —­ The practical, proportionate steps that a trade secret ­owner
                is expected to take to keep in --- ormation secret. Laws like the UTSA/DTSA require
                ­owners to implement such ­measures  --- or in --- ormation to quali --- y as a trade secret.
                 Examples include using #NDAs, restricting access on a need-­to-­know basis, encryp-
                 tion o ---

iles, — a­cil­i­ty security, #EmployeeTraining, and monitoring. What is “reason- able” may scale with the value o — the secret; extremely valuable secrets might warrant very extensive ­measures (like the Coca-­Cola vault example). # NDA —­ Nondisclosure agreement: A legally binding contract in which one or more parties agree to keep speci — ied in — ormation con — idential and not disclose it to ­others. NDAs are — oundational in protecting trade secrets when sharing in — ormation with employees, contractors, or business partners. A well-­dra — ted #NDA de — ines the con-


idential in — ormation, the permitted uses, and the duration o — secrecy. It provides a contractual basis to sue — or #BreachO — Contract i — someone leaks a secret, and it o — ten deters casual disclosures. # Con — identialityAgreement —­ A broad term — or contracts that impose con — idential- ity obligations, o — which #NDAs are a common example. It can also include clauses within larger contracts (like employment agreements, joint venture agreements, or ­service contracts) that require parties to keep shared in — ormation secret. ­These agree- ments both rein — orce and complement trade secret protections by legally binding parties to secrecy. (In essence, this is synonymous with an NDA, but the term can encompass vari­ous — orms such obligations take in di — ­ — er­ent contracts.) # NonCompete —­ An agreement that restricts an employee (or business seller, ­etc.)


rom working — or competitors or starting a competing business — or a speci — ied period ­a — ter leaving a com­pany. The primary aim is to prevent the #InevitableDisclosure o —

                 trade secrets and sensitive know-­how to competitors via employee mobility. Non-
                 competes must be reasonable in duration and scope to be en --- orceable, and their use
                 is regulated or restricted in many jurisdictions  --- or policy reasons. They are o --- ten used
                 alongside NDAs to protect #TS, although their en --- orceability varies by state/country.
                # EmployeeTraining —­ Involves, in the context o ---  trade secret protection, educating
                sta ---

about the com­pany’s con — identiality policies, its security procedures, and employ- ees’ personal obligations to protect sensitive in — ormation. Regular training sessions and reminders reduce #EmployeeNegligence by making employees aware o — social engineering tricks (like phishing), proper document ­handling, and reporting protocols


or suspected leaks. By instilling good practices, training supports a stronger #Cul- tureO — Secrecy and helps ­every employee become a line o — de — ense — or #TSProtection. # SecurityPolicy —­ Re — ers to the internal rules and procedures a com­pany establishes to sa — eguard its in — ormation and systems. This includes written policies on topics like clean desk rules, document classi — ication, password requirements, device use, remote access, incident response, and more. A robust security policy underpins trade secret

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 263 1/12/26 2:51 PM 264 Appendix D

                            protection by setting clear expectations and guidelines  --- or be­hav­ior. It works hand-­in-­
                            hand with technical ­measures and #EmployeeTraining, and it provides a  --- ramework
                            to en --- orce discipline i ---  someone violates security protocols (which could lead to an
                            #InsiderThreat incident i ---  not addressed).
                            # EndpointSecurity —­ Encompasses protective ­measures  --- or end-­user devices (com-
                            puters, smartphones, tablets, USB drives) that store or access com­pany data. For trade
                            secrets, endpoint security means ensuring that devices are encrypted, require strong
                            authentication, are kept updated against malware, and can be remotely wiped i ---  lost.
                            Since many breaches occur through lost or compromised devices (#DeviceSecurity
                            issues), maintaining strict endpoint security is a critical part o ---  #ReasonableMea­sures
                            to guard #Con --- identialIn --- o.



                                                       En --- orcement and Remedies
                              This category details the ­legal ave­nues and remedies available to trade secret ­owners
                            when misappropriation occurs, including both civil and criminal actions.
                            # Injunction —­ A court order that requires a party to do or re --- rain  --- rom ­doing speci --- ic
                            acts. In trade secret cases, injunctions are o --- ten used to stop  --- urther misappropriation
                            or disclosure o ---  secrets;  --- or example, a court might bar a de --- endant  --- rom using the
                            stolen secret or sharing it with ­others. Injunctions (especially temporary restraining
                            ­orders or preliminary injunctions) are crucial early remedies to prevent ongoing harm
                             and preserve the status quo while a case is litigated.
                            # ExParteSeizure —­ A unique remedy introduced by the #DTSA that allows a court to
                            order the seizure o ---  property (e.g., computers, documents) containing misappropri-
                            ated trade secrets without prior notice to the de --- endant. It is used only in extraordi-
                            nary circumstances where ­there is a high risk that the de --- endant would destroy or
                            hide the evidence i ---  warned. This remedy helps quickly secure the stolen trade secret
                            material and is  --- ollowed by a hearing shortly ­a --- ter. It is a power­ --- ul but sparingly used
                            tool to prevent imminent threats.
                            # Damages —­ Re --- ers to monetary compensation awarded to a trade secret ­owner  --- or
                            losses resulting  --- rom misappropriation. ­Under trade secret law, damages can include
                            the ­actual loss su ---

ered by the plainti —


(e.g., lost pro — its or costs incurred — rom the the — t) and/or the unjust enrichment obtained by the de — endant (pro — its the wrongdoer gained — rom using the secret). In some cases where calculating ­these is di —


icult, courts may impose a reasonable royalty — or the unauthorized use o — the secret. Damages aim to make the injured party ­whole. # ExemplaryDamages —­ Also known as punitive damages, ­these are additional dam- ages awarded to punish and deter particularly egregious be­hav­ior. ­Under the UTSA and the DTSA, i — the misappropriation is — ound to be will — ul and malicious, courts

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 264 1/12/26 2:51 PM Appendix D 265

                may award up to double the amount o ---  normal damages as exemplary damages. ­These
                are not meant to compensate the ­owner but to penalize the wrongdoer and send a
                message. Exemplary damages, along with pos­si­ble #AttorneysFees, serve as a deter-
                rent against intentional trade secret the --- t.
                #AttorneysFees —­ The ­legal costs incurred by the parties. In trade secret cases, courts
                can order the losing party to pay the prevailing party’s attorneys’  --- ees, but typically
                only in scenarios o ---  bad  --- aith or will --- ul/malicious misappropriation (­under UTSA/
                DTSA provisions). This is to discourage  --- rivolous claims or will --- ul wrongdoing. The
                possibility o ---  attorneys’  --- ees recovery can in --- luence the strategy o ---  litigation (e.g., a
                com­pany might be more willing to sue a will --- ul thie --- , knowing they could recover
                ­legal costs).
                # CriminalTSThe --- t —­ Re --- ers to the prosecution o ---  trade secret misappropriation ­under
                criminal laws (such as the #EEA in the United States or similar statutes elsewhere).
                Unlike civil #Litigation brought by the trade secret ­owner, criminal cases are brought
                by the government and can result in  --- ines and imprisonment  --- or the o ---

enders. This emphasizes that stealing trade secrets is not just a civil wrong but can be a crime, especially i — it involves — oreign espionage (#ForeignEspionage) or large-­scale the — t. # Litigation —­ The ­process o — resolving disputes through the court system. In the con- text o — trade secrets, litigation typically means a civil lawsuit — iled by a trade secret ­owner against an alleged misappropriator (a #TSLawsuit). Litigation encompasses pleadings, discovery (where evidence is exchanged —­ o — ten tricky when the evidence is a secret), motions, trial, and possibly appeals. It is a key en — orcement mecha- nism when other ­measures (like negotiations or cease-­and-­desist letters) — ail to stop misappropriation. # TSLawsuit —­ Re — ers to a speci — ic civil action initiated by a trade secret ­owner to seek l­egal redress — or misappropriation. Such a lawsuit can be — iled ­under state law (UTSA-­based) or — ederal law (#DTSA), or both. In a #TSLawsuit, the plainti —


aims to prove that the in — ormation was a protectable trade secret and that the de — endant misappropriated it, in the hope o — obtaining remedies like #Injunctions, #Damages, or permanently halting the de — endant’s use o — the secret. #TSLawsuits o — ten involve complex evidence (technical data, — orensic rec­ords o — access) and may be — iled in con- junction with other claims, like breach o — contract. # StatuteO — Limitations —­ The legally prescribed time period within which a trade secret claim must be — iled. ­Under the DTSA and most versions o — the UTSA, the statute o — limitations is 3 years — rom when the misappropriation was discovered or reasonably should have been discovered. This rule encourages prompt action by trade secret ­owners once they learn o — a the — t. I — a com­pany waits too long and the statute expires, they lose the right to bring a lawsuit, regardless o — the merits.

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 265 1/12/26 2:51 PM 6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 266 1/12/26 2:51 PM Table o — Cases

                3M v. Pribyl, 259 F.3d 587 (7th Cir.               Applied Materials, Inc. v. Advanced
                  2001), 23, 32, 177, 197                            Micro-Fabrication Equipment, Inc.,
                7EDU Impact Acad. Inc. v. Ya You, 2024               2009 WL 10694784 (N.D. Cal. 2009),
                  U.S. Dist. LEXIS 230110 (N.D. Cal.                 125
                  2024), 144                                       Auto Channel, Inc. v. Speedvision Net-
                                                                     work, LLC, 144 F. Supp. 2d 784 (W.D.
                Accent Packaging, Inc. v. Leggett & Platt,           Ky. 2001), 143, 157
                   Inc., 707 F.3d 1318 (Fed. Cir. 2013),
                   155                                             Bianco v. Globus Med., Inc., 30 F. Supp.
                Aday v. West --- ield Ins. Co., 2021 WL                   3d 565 (E.D. Tex. 2014), 153, 189, 196
                   1173003 (W.D. Ky. 2021), 182, 184               Bimbo Bakeries USA, Inc. v. Botticella,
                Air --- acts, Inc. v. Amezaga, 909 F.3d 84                613 F.3d 102 (3d Cir. 2010), 30
                   (4th Cir. 2018), 179, 185, 206                  BladeRoom Group Ltd. v. Emerson Elec-
                Allied Erecting & Dismantling Co. v.                  tric Co., 331 F. Supp. 3d 977 (N.D. Cal.
                   Genesis Equip. & M --- g., Inc., 511 F.                2018), 119
                   App’x 398 (6th Cir. 2013), 181                  Board o ---  Trade o ---  City o ---  Chicago v.
                Allstate Ins. Co. v. Fougere, 2021 WL                 Christie Grain & Stock Co., 198 U.S.
                   4441348 (D. Mass. 2021), 186                       236 (1905), 8, 17, 25, 59
                Altavion, Inc. v. Konica Minolta Systems           Boeing Co. v. Sierracin Corp., 738 P.2d
                   Laboratory, Inc., 226 Cal. App. 4th 26             665 (Wash. 1987), 65
                   (Cal. Ct. App. 2014), 14, 33, 55, 188           Bonito Boats, Inc. v. Thunder Cra --- t Boats,
                American Can Co. v. Mansukhani, 742                   Inc., 489 U.S. 141 (U.S. Supreme Ct.
                   F.2d 314 (7th Cir. 1984), 30                       1989), 26
                American Registry, LLC v. Hanaw, 2013              Brown & Brown, Inc. v. Johnson, 25
                   WL 6332971 (M.D. Fla. 2013), 187                   N.Y.3d 364 (2015), 127
                Amgen, Inc. v. Sandoz Inc., 791 F.3d 1313
                   (Fed. Cir. 2015), 204                           C3.ai Inc. v. Cummins, Inc., 2024 Del.
                Amnet v. CrossCountry Mortgage, 2020                 Super. LEXIS 622 (Del. Super. Ct.
                   WL 3489317 (N.D. Ill. 2020), 201                  2024), 151
                AnywhereCommerce, Inc. v. Ingenico                 Che --- s Diet Acquisition Corp. v. Lean
                   Inc., 578 F. Supp. 3d 219 (D. Mass.               Che --- s, LLC, 2016 U.S. Dist. LEXIS
                   2022), 91                                         133299 (S.D.N.Y. 2016), 52


                                                             267

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 267 1/12/26 2:51 PM 268 Table o — Cases

                            Chicago Lock Co. v. Fanberg, 676 F.2d        IBM v. Papermaster, 2008 U.S. Dist.
                               400 (9th Cir. 1982), 61, 90                  LEXIS 95516 (S.D.N.Y. 2008), 37
                            ClearOne Advantage, LLC v. Kersen,           Ingram v. Cantwell-Cleary Co., Inc., 260
                               2024 U.S. Dist. LEXIS 205636 (D. Md.         Md. App. 122 (2023), 148
                               2024), 52–53
                            ClearOne Communs., Inc. v. Bowers, 643       Janssen Prods. L.P. v. Evenus Pharms.
                               F.3d 735 (10th Cir. 2011), 51                Labs. Inc., 85 F.4th 147 (3d Cir. 2023),
                            Coca-Cola Bottling Co. v. The Coca-Cola         199, 207
                               Co., 269 F. 796 (D. Del. 1920), 12
                            Cognis Corp. v. Chemcentral Corp., 430       Kewanee Oil Co. v. Bicron Corp., 416
                               F. Supp. 2d 806 (N.D. Ill. 2006), 33        U.S. 470 (U.S. Supreme Court 1974), 9

                            Data General Corp. v. Digital Computer       Lasership, Inc. v. Watson, 79 Va. Cir. 205
                              Controls, Inc., 357 A.2d 105 (Del. Ch.        (2009), 121
                              1975), 37                                  LeJeune v. Coin Acceptors, Inc., 849 A.2d
                                                                            451 (Md. Ct. Spec. App. 2004), 86
                            E. I. du Pont de Nemours & Co. v. Chris-
                               topher, 431 F.2d 1012 (5th Cir. 1970),    Mattel, Inc. v. MGA Entertainment, Inc.,
                               22, 175                                     616 F.3d 904 (9th Cir. 2010), 198
                            E. I. du Pont de Nemours Powder Co. v.       MicroStrategy, Inc. v. Business Objects,
                               Masland, 244 U.S. 100 (U.S. Supreme         S.A., 331 F. Supp. 2d 396 (E.D. Va.
                               Ct. 1917), 9                                2004), 25

                            Fail-Sa --- e, LLC v. A.O. Smith Corp., 674      nClosures Inc. v. Block & Co., 770 F.3d
                               F.3d 889 (7th Cir. 2012), 75                598 (7th Cir. 2014), 19, 63, 119
                            Fred’s Stores o ---  Tennessee, Inc. v. M & P    Novus Group, LLC v. Prudential Finan-
                               Partners, LLC, 2015 U.S. Dist. LEXIS        cial, Inc., No. 12-CV-5279 (S.D.N.Y.
                               178745 (N.D. Miss. 2015), 66                Apr. 22, 2014), 87

                            General Electric Co. v. Sung, 843 F. Supp.   Paragon Techs., Inc. v. United States, 567
                              776 (D. Mass. 1994), 35                       F.3d 1329 (Fed. Cir. 2009), 67
                            GlobeRanger Corp. v. So --- tware AG USA,        Peabody v. Nor --- olk, 98 Mass. 452 (Mass.
                              Inc., 836 F.3d 477 (5th Cir. 2016), 88,       Sup. Ct. 1868), 7
                              160                                        PepsiCo, Inc. v. Redmond, 54 F.3d 1262
                            Great Hill Equity Partners IV, LP v. SIG        (7th Cir. 1995), 123, 180, 194
                              Growth Equity Fund I, LLLP, 2020
                              Del. Ch. LEXIS 76 (Del. Ch. 2020),         Religious Technology Center v. Lerma,
                              120                                          908 F. Supp. 1362 (E.D. Va. 1995), 16,
                            Gupton v. Village Inn Pancake House, 89        56, 183
                              So. 2d 847 (Fla. 1956), 124
                                                                         SIS, LLC v. Stoneridge So --- tware, Inc.,
                            Hertz v. Luzenac Group, 576 F.3d 1103           2023 U.S. App. LEXIS 748 (11th Cir.
                              (10th Cir. 2009), 18, 71                      2023), 148

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 268 1/12/26 2:51 PM Table o — Cases 269

                Syntel Sterling Best Shores Mauritius          Vickery v. Welch, 36 Mass. 523 (Mass.
                  Limited v. The TriZetto Group, Inc.,            Sup. Ct. 1837), 7
                  68 F.4th 792 (2d Cir. 2023), 35
                                                               WellSpan Health v. Bayliss, 2005 PA
                TEKsystems, Inc. v. Bolton, 2019 WL              Super 76 (2005), 121
                  237388 (D. Kan. Jan. 16, 2019), 122          Winston Research Corp. v. Minnesota
                                                                 Mining & M --- g. Co., 350 F.2d 134 (9th
                United States v. Aleynikov, 676 F.3d 71          Cir. 1965), 27
                  (2d Cir. 2012), 202
                United States v. Jin, 733 F.3d 718 (7th Cir.
                  2013), 85

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 269 1/12/26 2:51 PM 6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 270 1/12/26 2:51 PM Index

                A                                                     continuing misappropriation, 231, 238
                access control, 85, 128, 129, 161, 165, 166           copyright, 11, 184, 227, 250
                access logs, 94, 95, 102, 132, 136, 137,              criterion, 13, 20, 44, 46, 199
                    165, 168, 190, 218                                customer list, 4, 55, 73
                actual loss, 5, 31, 32, 195–198, 200,
                    230, 237, 264                                     D
                a ---

irmative steps, 62, 145, 154, 159 data loss, 165 algorithm, 4, 10, 11, 52, 64, 69, 78, 80, 82, 90, 219, 260 E attorney’s — ees, 5, 33, 34, 38, 147, 173, encrypt, 81, 237 200, 201, 214, 230, 265 engineering drawings, 37 European Union, 41, 44, 220, 245, 248, B 249, 251, 258 bad — aith, 5, 34, 43, 83, 141, 230, 238, 265 EU Trade Secrets Directive, 41, 44, 245, breach o — con — idence, 8, 9, 13, 27, 43, 44, 248 248 ex parte civil seizure, 198–200 breach o — contract, 22, 27, 43, 61, 176, exemplary damages, 5, 33, 34, 230, 237, 252, 265 241, 265 bribery, 22, 23, 61, 175, 229, 244, 247 exit interview, 136, 137 burden o — proo — , 202, 203, 206, 236 F C
— iduciary duty, 176, 252 Canada, 42, 43
— irewall, 107 chemical — ormula, 33 clean desk, 263 G cloud storage, 136, 162, 165 general knowledge, 11, 17, 51 competitive advantage, 3, 15, 28, 30, 55, 56, 59, 60, 64, 122, 191, 194, 196, 201, I 211, 218, 245, 246 independent development, 21, 26, 27, 84, compilation, 3, 54, 229, 246 101, 247 consent, 4, 43, 145, 152, 158, 229, 235, inevitable disclosure, 30, 45, 82, 86, 123, 243 124, 194, 215, 256

                                                                271

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 271 1/12/26 2:51 PM 272 Index

                            incident response, 162, 166, 168, 169,        O
                               255, 262, 263                              open innovation, 44, 254
                            in --- ormation mosaic, 246
                            in --- ormation security, 73, 89, 99, 167         P
                            injunctive relie --- , 5, 7, 24, 29–31, 34–37,    password, 82, 98, 192, 263
                               44, 51, 77, 85, 86, 123, 133, 144, 180,    patent, 4, 7, 9–12, 17, 26–28, 33, 39, 46,
                               188, 192–195, 230, 237, 238, 252,             58, 82, 93, 96, 103, 117, 149, 150, 177,
                               264                                           184, 188, 189, 227, 250, 258
                            inspection, 89, 146, 165                      permanent injunction, 29–31, 36, 194,
                            intellectual property, 10, 12, 13, 43, 47,       195
                               70, 79, 90, 115, 125, 150, 204, 224,       preliminary injunction, 29, 30, 37, 44, 85,
                               246, 248, 250, 253, 254                       123, 144, 188, 193, 194
                            inventory, 70, 165                            privilege, 129
                            Israel, 43                                    product design, 81
                            ISO/IEC 27001, 166                            protective order, 82, 205
                                                                          public domain, 24, 36, 57, 59, 96, 183,
                            J                                                189
                            jurisdiction, 45, 82, 93, 108, 115, 123,
                               126, 203, 204, 220, 238                    R
                                                                          reasonable measures, 3, 4, 6, 9, 13, 19–21,
                            L                                                45, 46, 53, 62, 63, 69, 80, 87, 88, 91, 97,
                            least privilege, 129                             100, 138, 141, 144, 160, 162, 165, 167,
                            lost pro --- its, 24, 29, 31, 42, 196, 254, 264      185, 186, 188, 191, 199, 206, 208, 209,
                                                                             210, 213, 214, 219, 221, 222, 224
                            M                                             reasonable particularity, 234
                            manu --- acturing process, 22, 60, 64, 253        reasonable royalty, 5, 24, 31–33, 195, 197,
                            matrix, 98, 99                                   198, 230, 237, 254, 264
                            metadata, 69, 81                              Restatement (First) o ---  Torts, 3
                            Mexico 43                                     restrictive covenant, 118, 122, 126, 127
                                                                          reverse engineering, 4, 17, 18, 21, 26, 27,
                            N                                                42, 46, 60, 61, 64, 83, 84, 88–90, 96,
                            negative know-how 14                             101, 110, 112, 154–156, 171,
                            NIST Cybersecurity Framework 99–100              174, 187, 244, 250
                            nondisclosure agreement, 16, 19, 20,          risk assessment, 76–78, 80, 97, 98, 102,
                              27, 43–46, 62, 63, 89, 92, 95, 98, 101,        262
                              102, 110, 113, 119, 120, 143, 209, 211,
                              213–215, 221, 246, 251–253, 256, 257,       S
                              263                                         sealed  --- ilings, 252
                            non-solicitation agreement 42, 107–110,       social engineering, 262, 263
                              113–115, 118, 120–122                       source code, 11, 25, 50, 54, 57, 84, 129,
                            noncompete agreement 44, 107–110,                154, 249, 250
                              113, 118, 122                               statute o ---  limitations, 231, 265

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 272 1/12/26 2:51 PM Index 273

                summary judgment, 143, 188, 191, 206           United States‚ Mexico‚ Canada Agree-
                supply chain, 82, 96, 143, 256                   ment, 42, 43, 249
                                                               unjust enrichment, 5, 24, 31, 32, 42,
                T                                                195–198, 200, 230, 237, 264
                temporary restraining order, 193
                trade secret inventory, 49, 50, 68–74          V
                trade secret protection plan, 45, 46, 208,     valuation, 253, 254
                   209–217, 219, 221–224, 262                  venue, 203, 204
                TRIPS Agreement, 39, 40, 248, 249, 258
                                                               W
                U                                              whistleblower, 46, 247, 256
                Uni --- orm Trade Secrets Act, 3–5, 9, 13,         World Trade Organization, 39, 40, 248
                  22, 28, 29, 31, 33, 34, 38–45, 47, 54, 61,
                  148, 173–175, 198, 200, 204, 211, 213,
                  245, 247, 248, 252, 263–265

6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 273 1/12/26 2:51 PM 6406_Oranburg_Protecting Trade Secrets_5pp (no AppE).indb 274 1/12/26 2:51 PM